Search This Blog

Wednesday, February 29, 2012

FTC: Identity theft still top consumer blight

The security risks and rewards of big data | Cisco takes first step in delivering on SecureX vision

Network World Security

Forward this to a Friend >>>


FTC: Identity theft still top consumer blight
The Federal Trade Commission has released its annual list of top consumer complaints and for the fourth year in a row identity theft leads the pack. Read More


WHITE PAPER: Quest Software

Data Protection and Recovery
A comprehensive backup and recovery solution is one supporting a tiered-recovery model. This IDC Vendor Spotlight examines the forces driving the advancements in data protection technologies. Discover the benefits of a solution that works across physical, virtual and cloud environments. Read it today. Read Now!

WHITE PAPER: GFI Software

GFI VIPRE Antivirus Business 5.0
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More

The security risks and rewards of big data
Big data does not automatically mean big security improvements. If not handled with care and expertise, it could mean the opposite. That will be the focus of a panel discussion at the RSA Conference in San Francisco today at 3:50 p.m. in room 301. Read More

Cisco takes first step in delivering on SecureX vision
A year Cisco put forward its vision called SecureX about how it would devise ways that its network products, first its firewalls, would be able to capture information related to user devices, especially tablets and smartphones, to exert context-based security control. Today, Cisco took the first step to deliver on that vision while acknowledging more needs to be done. Read More

RSA Conference: Symantec inaugurates O3 cloud-based single sign-on service
At the RSA Conference Tuesday, Symantec announced general availability of its O3 cloud-based single sign-on (SSO) and authentication service, which adheres to a concept company CEO Enrique Salem outlined exactly a year ago at RSA 2011. Symantec also provided detail on future capabilities the O3 cloud service will have for data-loss prevention and encryption. Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

RSA teams to bolster security for Apple, Google, RIM devices
RSA, the security division of EMC, today said it would collaborate with several mobile and virtualization platform vendors to integrate RSA two-factor authentication and risk-detection technologies. Read More

What's hot at RSA 2012
Read More

MWC2012: Convenience, security helping NFC growth
Near field communication chip maker NXP showed off what's possible with the technology at its booth at Mobile World Congress in Barcelona. Read More


WHITE PAPER: NetIQ

5 Things You Need to Know About Disaster Recovery Planning
Download this short, easy-to-digest Disaster Recovery eBook today. It's packed with unique planning approaches to make your data center less vulnerable to natural and man-made disasters. Warning, side effects may include reduced stress levels. Learn More!

Cyber threats a game changer for the FBI
The rising tide of cyber threats has caused the FBI to change how it operates, FBI Director Robert Mueller will tell RSA Conference attendees Thursday. Read More

Google puts $1M on the line for Chrome exploit rewards
Google on Monday withdrew as a sponsor of next month's Pwn2Own hacking contest, and will instead put as much as $1 million up for grabs if researchers can exploit Chrome. Read More

Microsoft India warns hackers may have compromised customer financial data
Microsoft has warned customers that their financial data such as credit card information may have been compromised by hackers who attacked the company's online store in India earlier this month. Read More

Ultimate Man vs. Computer: Garry Kasparov, Deep Blue and the Internet
Garry Kasparov battled IBM's Deep Blue 16 years ago in February, but that was just the beginning Read More

Quick look: Silicon Valley's wicked young CEOs
Silicon Valley youngsters get lots of money for new, innovative Internet companies Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Steve Jobs ignored Warren Buffet's advice for a stock buyback
  2. Windows 8 most burning questions
  3. Cisco bounces back
  4. 6 things you need to know about Google's new privacy policy
  5. IBM scientists discuss quantum computing breakthrough
  6. Make way for iPad 3: Best Buy slashes iPad 2 prices
  7. What's hot at RSA 2012
  8. Windows 8 quiz
  9. IBM's molecular images may help nanoscale circuits
  10. Cisco: "We've never been more relevant"

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: