Search This Blog

Tuesday, January 26, 2010

Data breach costs top $200 per customer record

Informing victims of identity theft | Study: CISOs Keep Breach Costs Lower

Network World Security Alert

Forward this to a Friend >>>


Data breach costs top $200 per customer record
The cost of a data breach rose last year to $204 per customer record, according to the Ponemon Institute. The average total cost of a data breach rose from $6.65 million in 2008 to $6.75 million in 2009. Read More


RESOURCE COMPLIMENTS OF: Cisco

Network Virtualization helps Reduce IT Operational Costs
Network virtualization solutions extend the benefits of virtualization technologies throughout campus and distributed networks, reaching every endpoint and managing every user. This paper spans the following topics: - The business need for network virtualization - Definition of network virtualization - Overview of Cisco campus network virtualization solutions and their business benefits - Industry scenarios that illustrate Cisco network virtualization solutions Read more now!

WHITE PAPER: Trend Micro

Securing Virtualized Data Centers - ebook
The appeal of the cost savings, flexible capacity, and failover that virtualization enables is undeniable. The big question is can today's datacenter balance this increased flexibility with the need to maintain security policies and control over applications, along with the ability to prove compliance? This ebook provides the answers to critical virtualization security questions. Read Now

Informing victims of identity theft
Until recently, information assurance (IA) personnel and attorneys specializing in this area of the law have had to search for the appropriate governing laws for each jurisdiction. In this column, I review a valuable resource for locating the laws which apply to disclosure of personally identifiable information (PII) in each state in the United States and internationally. Read More

Study: CISOs Keep Breach Costs Lower
The latest "Cost of a Data Breach" survey from the Ponemon Institute finds companies with a CISO are better able to handle loss of sensitive information. Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

How we tested the Netgear STM600 security appliance
We tested the STM600 over a one-month period for anti-spam effectiveness, Web security and email configuration and features, and performance. Read More

Netgear targets SMB market with new security tool
Netgear's new security appliance takes on SMB stalwarts such as Fortinet and Barracuda by including key functions of antispam, antimalware, and Web content filtering into a single unit combining easy deployment and budget-preserving pricing. Read More


WHITE PAPER: Tripwire

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process. Click here.

HP unveils extensive security services package
HP Monday announced an extensive security-services portfolio that includes more than 90 basic offerings for application, identity and access management security to business continuity, cloud computing and managed services aimed at businesses and government. Read More

Stop 11 Hidden Security Threats
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting? Malicious hackers are a resourceful bunch, and their methods continually evolve to target the ways we use our computers now. New attack techniques allow bad guys to stay one step ahead of security software and to get the better of even cautious and well-informed PC users. Read More

Port of Los Angeles Fights Crime Fighting With Mobile Video
The Project: Deploy mobile communications software to enable transmission of live video to and from the Port of Los Angeles' control centers and harbor police in the field. The project is part of a $4.2 million integrated command console system designed to improve security responsiveness at the nation's busiest cargo port. Read More

Internetwork Performance Monitor Vulnerability
Cisco announced a vulnerability on Internetwork Performance Monitor (IPM) today at the following URL: http://www.cisco.com/warp/public/707/cisco-sa-20100120-ipm.shtml Internetwork Performance Monitor (IPM) is an add-on for the Cisco Works network management platform. IPM is a graphical utility that works very closely with service assurance agent (SAA) probes in a technology suite that Cisco... Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: