RefBan

Referral Banners

Tuesday, April 12, 2011

Strong Information Security Starts at Endpoints; Mobile Attacks on the Rise


Comments or questions? Contact Susan Nunziata, CIO Insight Editor in Chief, here.

Don't miss a single issue of the CIO Insight newsletter! Add newsletters@response.cioinsight.com to your address book. View newsletter in a browser window.
Share this email on:
Facebook LinkedIn Twitter Ping
HOME TRENDS RESEARCH EXPERT VOICES STRATEGIC TECH
Salaries   |   Workplace   |   Leadership   |   Security   |   Web 2.0 April 12, 2011
Featured Story (Scroll Down for More)
InfoSec Starts at Endpoints
As we watch the fallout from Epsilon data breach, we're all facing questions about what more can be done to safeguard sensitive information. Of course, strong enterprise security is an expensive proposition. A recent report from IBM reveals that many IT decision makers are focusing on increasing investments in endpoint security.
READ MORE >>
Mobile Attacks on the Rise
Vulnerabilities up 42% in 2010.
READ MORE >>
'Backdoor' Mobility
Rogue devices frighten CIOs.
READ MORE >>
 
IT Risks
Are CIOs up to the challenge?
READ MORE >>
Security Spending Trends
Where do the dollars go?
READ MORE >>
CIO Insight Extra
Epsilon Data Breach Casts a Dark Cloud
This latest data breach calls into question how secure information is within a cloud-computing infrastructure.
READ MORE >>

EMC Buys Security Automation Vendor NetWitness
NetWitness will operate as a part of RSA, the security division of EMC.
READ MORE >>

Sponsored by Insight

Is your IT department stretched too thin?
McAfee Security-as-a-Service. Comprehensive protection delivered in the cloud.
Learn more.
ADVERTISEMENT
BP Employee Loses Laptop with Thousands of Personal Records
A BP employee on a business trip misplaced a laptop containing private information of about 13,000 individuals.
READ MORE >>

Companies Under-Report Cyber-Crime Incidents
As attacks on intellectual property increase, organizations are also less willing to publicize or thoroughly investigate the incidents, a McAfee report finds.
READ MORE >>

Third-Party Data Breaches Compromise Tourists, GSN Members
Criminals hacked into a third-party marketing firm's system and stole member information from tourists visiting Maine, Game Show Network members and Play.com shoppers.
READ MORE >>

Featured White Papers
How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>

Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

Sign up for complimentary subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360° view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

CIO Insight Newsletter Management

You are currently subscribed to the CIO Insight newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive the CIO Insight newsletter, unsubscribe here

Copyright © 2011 Ziff Davis Enterprise. All Rights Reserved.
Ziff Davis Enterprise, 28 East 28th Street, New York, NY 10016
Privacy Policy

No comments: