RefBan

Referral Banners

Tuesday, May 10, 2011

Security, Compliance Top Critical Concerns of IT Pros; Sony Networks Lacked Firewall, Ran Obsolete Software: Testimony

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - May 10, 2011
Security, Compliance Top Critical Concerns of IT Pros
Sony Networks Lacked Firewall, Ran Obsolete Software: Testimony
Cloud Service Providers Say Data Security Not Their Job
FTC Settles with Ceridian, Lookout over Breach, Weak Security
New Norton Cyber-Crime Unit Delivers Expertise to Fight Emerging Threats
SPOTLIGHT
Google Maps Shows bin Laden Hideouts
Pinpoint Osama bin Laden's numerous hiding places throughout his infamous career, up to where he met his violent end.
READ MORE >>
BEST OF eWEEK
Google Maps Alabama Tornado Havoc
New BlackBerry Bolds Thin, Powerful
Why Macs Outshine Windows PCs
Touch-Screen Musicians Virtually Jam
FEATURED VIDEO
Essential Steps for SMBs
We look at five tech steps SMBs need to take to keep up with the times.
WATCH NOW >>
MOST READ STORIES
Why Motorola Delayed the Droid Bionic
Why iPad 3 Should Be Released This Year
iPhone 5 Uncertain, so Buy iPhone 4
Features You Won't See in the iPhone 5
IN THIS ISSUE
Security, Compliance Top Critical Concerns of IT Pros
While regulatory compliance, IT governance, information security and disaster recovery remained the top four concerns for IT professionals, there were other areas that were adding complexity and increasing risk, according to a recent report by ISACA, a global association of more than 95,000 IT professionals. IT departments are also worried about data breaches, cloud computing and the rise in number of consumer devices in the enterprise.
READ MORE >>

Sony Networks Lacked Firewall, Ran Obsolete Software: Testimony
Sony could have prevented the breach if they'd applied some fundamental security measures such as deploying network firewalls and using fully updated Web applications, according to testimony before a Congressional committee.
READ MORE >>

Sponsored by Cisco


Video is one of the great promises of the social enterprise, but how do you leverage it? Learn 5 ways to build video communities at work and more with this informative video.
Watch the Video
ADVERTISEMENT
Cloud Service Providers Say Data Security Not Their Job
Who is responsible for securing customer data in the cloud? The cloud vendors don't think data security is their responsibility, according to a Ponemon Institute study.
READ MORE >>

FTC Settles with Ceridian, Lookout over Breach, Weak Security
Ceridian and Lookout Services settled the lawsuits from the Federal Trade Commission over their poor Web security practices that compromised customer data.
READ MORE >>

New Norton Cyber-Crime Unit Delivers Expertise to Fight Emerging Threats
News Analysis: Symantec's new Norton Cybersecurity Institute was organized to serve as a facilitator in partnerships among law enforcement, government, private industry and education to fight online crime in all its forms.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Demystifying the Cloud - A Conversation with Dell's CIO & CTO!
May 10, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
Join Dell's Chief Innovation Officer Jim Stikeleather and Chief Technology Officer Kris Fitzgerald as they untangle the nebulous world of cloud computing. These luminaries will explain the various types of cloud services, and they'll also show how to best utilize and customize cloud computing for your environment.
REGISTER >>

Meeting the New Demands for Management & Security with All-In-One PCs
May 23, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
vPro is also the key to manage the security issues in a far more rigorous and comprehensive fashion due to increasing governance and compliance demands as well as new and evolving threats. Lenovo adds to vPro with their own unique solutions.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: