RefBan

Referral Banners

Tuesday, May 31, 2011

Data Breaches Underscore Urgency for Security Code of Conduct; Why Mac's Supposed Immunity to Security Threats Gone Forever

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - May 31, 2011
Data Breaches Underscore Urgency for Security Code of Conduct
Why Mac's Supposed Immunity to Security Threats Gone Forever
IE Flaw Lets Attackers Steal Cookies, Access User Accounts
HIPAA, HITECH Compliance Not Improving Health Care Data Security
Damballa CSP Automates Botnet Identification, Removal
SPOTLIGHT
Teardown: Covert FBI GPS Auto-Tracker
iFixit cracked open a GPS device capable of constantly tracking location that FBI agents have installed underneath some vehicles.
READ MORE >>
BEST OF eWEEK
Hands-On with Samsung's Chromebook
Windows' Unbreakable Market Dominance
Top 10 Features Microsoft Project 2010
Smart Cable Adds On 3D-Like Depth
FEATURED VIDEO
From Virtualization to Cloud
We bring you tips and strategies to smoothly evolve existing virtualization.
WATCH NOW >>
MOST READ STORIES
Galaxy Tab 10.1: Fine iPad Alternative
Droid X2: Best of the Old with the New
Biggest Data Breaches of 2011 So Far
Why iPad 3 Should Be Released This Year
IN THIS ISSUE
Data Breaches Underscore Urgency for Security Code of Conduct
Recent high-profile breaches have prompted lawmakers to propose a federal data breach notification law. And Consumer Reports has come out with a "Code of Conduct" companies should follow to be "better custodians" of their customers' data. We take a deeper look.
READ MORE >>

Why Mac's Supposed Immunity to Security Threats Gone Forever
News Analysis: The days of Mac OS X being seemingly immune from viruses and other malware are gone forever as Apple has finally acknowledged the existence of fake Macintosh antivirus scams.
READ MORE >>

Sponsored by VeriSign


The world's leading SSL certificates now offer more protection and security. Now from Symantec. The VeriSign seal is displayed more than 250 million times a day on more than 90,000 websites and inspires confidence among your customer base when on your site.
Start your free trial at verisign.com/ssl/free-30day-trial
ADVERTISEMENT
IE Flaw Lets Attackers Steal Cookies, Access User Accounts
An independent security consultant demonstrated a "cookiejacking" technique to show how attackers can steal Web cookies to access user accounts online.
READ MORE >>

HIPAA, HITECH Compliance Not Improving Health Care Data Security
Despite spending a lot of time making sure they are compliant with federal and state regulations, health care organizations claim they are still seeing a lot of data breaches.
READ MORE >>

Damballa CSP Automates Botnet Identification, Removal
Damballa updated its CSP appliances to help Internet service providers and telco carriers roll out systems that can monitor and identify infected subscriber devices on their networks.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: