RefBan

Referral Banners

Thursday, May 5, 2011

10 Possible Results of Sony's PlayStation Network Breaches; Epsilon Data Breach to Cost Billions in Worst-Case Scenario

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - May 5, 2011
10 Possible Results of Sony's PlayStation Network Breaches
Epsilon Data Breach to Cost Billions in Worst-Case Scenario
Microsoft Issues First-Ever Windows Phone 7 Security Update
Fake AV Targets Mac OS X Through Poisoned Search Links
Mozilla Patches Critical Firefox Security Flaws
SPOTLIGHT
Why iPad 3 Should Be Released This Year
Apple said it has no plans to release a new iPad model in 2011. But we look at why the company should reconsider that decision.
READ MORE >>
BEST OF eWEEK
First Look: Apple's White iPhone
The Tablet PC's First 123 Years
Google Shows Off Data Center Security
Low-Cost Micro-Camera Takes Clear Pics
FEATURED VIDEO
How BA Can Pay Off Big
Business analytics (BA) can turn data into actionable, profitable guidance.
WATCH NOW >>
MOST READ STORIES
Top Programming Languages for 2011
Google Maps Charts Japan Devastation
Google Docs vs. Word Web App in Cloud
Dell PowerEdge R415 Is 1U Workhorse
IN THIS ISSUE
10 Possible Results of Sony's PlayStation Network Breaches
As the PlayStation Network data breach continues to vex Sony customers around the globe, a number of things could come out of it, most of them bad, for Sony and for the users of its gaming and entertainment services.
READ MORE >>

Epsilon Data Breach to Cost Billions in Worst-Case Scenario
The ultimate price tag of the data breach at email marketing company Epsilon could be as high as $4 billion, depending on what happens to the stolen data and customer churn, a cyber-risk analytics firm said.
READ MORE >>

Sponsored by Cisco


Video is one of the great promises of the social enterprise, but how do you leverage it? Learn 5 ways to build video communities at work and more with this informative video.
Watch the Video
ADVERTISEMENT
Microsoft Issues First-Ever Windows Phone 7 Security Update
Microsoft has released its first-ever security update for Windows Phone 7, an expansion of a security advisory for Windows.
READ MORE >>

Fake AV Targets Mac OS X Through Poisoned Search Links
Attackers are distributing a fake antivirus specifically designed to look like a real Mac OS X application using poisoned search results.
READ MORE >>

Mozilla Patches Critical Firefox Security Flaws
Mozilla addresses a number of critical vulnerabilities in Firefox 3, 3.5 and 4, including security flaws affecting Mac OS X users and ASLR issues affecting Windows 7 and Vista users.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Demystifying the Cloud - A Conversation with Dell's CIO & CTO!
May 10, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
Join Dell's Chief Innovation Officer Jim Stikeleather and Chief Technology Officer Kris Fitzgerald as they untangle the nebulous world of cloud computing. These luminaries will explain the various types of cloud services, and they'll also show how to best utilize and customize cloud computing for your environment.
REGISTER >>

Meeting the New Demands for Management & Security with All-In-One PCs
May 23, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
vPro is also the key to manage the security issues in a far more rigorous and comprehensive fashion due to increasing governance and compliance demands as well as new and evolving threats. Lenovo adds to vPro with their own unique solutions.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: