Search This Blog

Wednesday, June 20, 2012

The Worst Data Breach Incidents of 2012 – So Far

Security: An Inconvienient Truth | Check Point product line offers anti-DDoS protection

Network World Security

Forward this to a Friend >>>


The Worst Data Breach Incidents of 2012 – So Far
Out of 189 breaches recorded through mid-June, here are the top 15 according to Identity Theft Resource Center. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Top 5 Reasons to Choose SolarWinds® LEM Over Splunk®.
SolarWinds Log & Event Manager (LEM), with node-based licensing that lets you pay only for what you monitor, is an affordable alternative to volume-based Splunk pricing. With real-time, in-memory event log correlation, active response technology and advanced IT search, you get all the features of a powerful SIEM solution, at an affordable price! Interested in learning more about powerful SIEM software for log collection, analysis and event management from SolarWinds? Click here to learn more and why to choose SolarWinds LEM over Splunk!

WHITE PAPER: MegaPath

6 Best Practices to Ensure a Thorough Evaluation
Identify 6 key situations that demonstrate when it's time to consider managed network services, plus 6 best practices to ensure your evaluation of managed network service providers is thorough enough to support your decision. View Now

Security: An Inconvienient Truth
One of the things I dislike about being a security person is the "we are the people who say no or make it harder than it has to be". For many people the security team are the people who just seem to live to make it harder. We don't let them use wireless, surf web sites they want to go to, engage in social media activities, install applications, change their passwords, etc. etc. I get it. No one... Read More

Check Point product line offers anti-DDoS protection
Check Point Software Technologies Ltd. today announced its first line of products to fight distributed denial-of-service attacks (DDoS). Read More

Should best cybercrime defense include some offense?
A growing number of U.S. companies have concluded that in their battle against hackers, the best defense has to include some offense. Read More

Virtual analysis misses a third of malware
Roughly a third of malware sent to a virtualized environment for analysis is able to elude detection, a security expert says. Read More


WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

LinkedIn hit with lawsuit over massive data breach
LinkedIn has been hit with a potential class-action lawsuit alleging it failed to meet "industry standard" security practices in connection with a massive data breach earlier this month, according to court documents. Read More

NSA claims it would violate Americans' privacy to say how many of us it spied on
Would you believe the Inspector General from the Office of the Director of National Intelligence said it would violate the privacy of Americans for the IG office to tell us how many people in the United States had their privacy violated via the NSA warrantless wiretap powers which were granted under the FISA Amendment Act of 2008? Read More

Researchers set new cryptanalysis world record for pairing-based cryptography
Researchers from Fujitsu Laboratories, Japan's National Institute of Information and Communications Technology (NICT) and Kyushu University have set a new cryptanalysis world record by cracking a 278-digit-long (923-bit) key used in a pairing-based cryptography system, Japanese IT services provider Fujitsu said Monday. Read More

Data breach? Virtual bounty hunters will hunt it down
Security expert Dan Clements is building a virtual "lost and found" box for data, a concept he hopes companies suffering from data breaches will embrace to find out just how bad the damage is. Read More


WHITE PAPER: Motorola

WiNG 5 Wireless LAN: Delivering Better Quality of Experience
Can your wireless network infrastructure handle the growing numbers of mobile devices taking significant bandwidth bites out of your network? The good news is that with smart, cost-effective wireless infrastructure investments, not only can you scale quickly to secure the growing number of devices you serve, but also optimize their performance. Learn More.

New Android malware disguised as security app
Google's Android mobile platform is the target of a new variant of a widely used malware capable of stealing personal information. Read More

What You Really Need to Know About Cloud Security
Despite all of the hand wringing over cloud security, major cloud security breaches haven't been grabbing headlines. The past year has seen major breaches, such as the ones that hit Sony and Epsilon, but we haven't heard much of an emphasis about the cloud being a weakness. Read More

The Future of Drone Surveillance: Swarms of Cyborg Insect Drones
Forget the roachbots and the swarm of MIT humanoid robots dancing in sync, as well as "disposable" quarter-sized kilobots which are "cheap enough to swarm in th Read More

Mobile security startup Bluebox gets $9.5 million in funding
Mobile security startup Bluebox eases out of stealth mode today with an announcement of $9.5 million in Series A funding, but doesn't plan a product announcement until later this year. Read More



SLIDESHOWS

Cool Summer Gadget Guide
Here are some suggestions for some great summer gadgets for work, travel, outdoors and exercise that will get you more enjoyment out of the summer season.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Porn maker's lawsuit against roommate threatens free Wi-Fi
  2. Stuxnet cyberattack by U.S. a 'destabilizing and dangerous' course of action
  3. Microsoft Surface: 'A PC, a tablet and new'
  4. The 10 mightiest supercomputers on Earth
  5. Microsoft launches own Windows 8 tablets, one a 'full PC'
  6. Cisco ONE: Proof that Cisco doesn't get SDNs
  7. Why Yammer is worth $1 billion to Microsoft
  8. U.S. reclaims top spot on Top 500 supercomputing list
  9. What are the killer apps for software-defined networks?
  10. Cool summer gadget guide

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: