SlideShare uma empresa Scribd logo
1 de 14
State of Technology Security
The Top 10 Security Stories Of 2009




web security | data security | email security   © 2009 Websense, Inc. All rights reserved.
The Top 10 Security Stories Of 2009


               01 DECEMBER 2009



http://www.crn.com/security/222000125;jsessionid=GEDXH
         5CL3BSKZQE1GHPCKHWATMY32JVN



                                           © 2009 Websense, Inc. All rights reserved.   2
The Top Security Stories Of 2009




                                   © 2009 Websense, Inc. All rights reserved.   3
1. Conficker Strikes




                       © 2009 Websense, Inc. All rights reserved.   4
2. Heartland Breach Compromises…




                                   © 2009 Websense, Inc. All rights reserved.   5
3. U.S. Ramps Up Cybersecurity




                                 © 2009 Websense, Inc. All rights reserved.   6
4. Political Hactivists Make…




                                © 2009 Websense, Inc. All rights reserved.   7
5. Apple iPhone Vulnerability




                                © 2009 Websense, Inc. All rights reserved.   8
6. Symantec: Thompon Out, Salem In




                                     © 2009 Websense, Inc. All rights reserved.   9
7. McAfee Rebuilds Channel Bridges




                                     © 2009 Websense, Inc. All rights reserved.   10
8. Attackers Target Social Networks




                                      © 2009 Websense, Inc. All rights reserved.   11
9. TJX Hacker Indicted




                         © 2009 Websense, Inc. All rights reserved.   12
10. Cloud Solutions Skyrocket




                                © 2009 Websense, Inc. All rights reserved.   13
Kontakt
For yderligere information kontakt :

   Kim Rene Jensen
   Territory Manager
   Denmark, Faroe Island, Greenland
   +45 31668595
   krjensen@websense.com
   Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen




Følg Websense her :

Facebook :       http://www.facebook.com/websense
Twitter :        http://www.twitter.com/websense
YouTube :        http://www.youtube.com/watch?v=0RvGhgeg5mU


                                                       © 2009 Websense, Inc. All rights reserved.   14

Mais conteúdo relacionado

Mais procurados

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber ThreatsAaron Vick
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
 
Royal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz ReportRoyal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz ReportGoldbach Group AG
 
Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?Stavros Drakoularakos
 

Mais procurados (8)

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Security tips
Security tips Security tips
Security tips
 
Anti virus
Anti virusAnti virus
Anti virus
 
Umix
UmixUmix
Umix
 
Royal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz ReportRoyal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz Report
 
Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?
 
How To Do Social Media Right - 2015
How To Do Social Media Right - 2015How To Do Social Media Right - 2015
How To Do Social Media Right - 2015
 

Destaque

Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7TerryPearce
 
Ganadores premio callao - peru
Ganadores premio   callao - peruGanadores premio   callao - peru
Ganadores premio callao - peruMaria Tobon
 
Human Design by Leonora Bentley
Human Design by Leonora Bentley Human Design by Leonora Bentley
Human Design by Leonora Bentley Xtraordinary Women
 
Juego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaJuego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaCamilo Montes
 
เมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลกเมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลกGuangming Sangkeettrakarn
 
Bienaventuranzas del cuidado
Bienaventuranzas del cuidadoBienaventuranzas del cuidado
Bienaventuranzas del cuidadoxaquintana
 
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel CIT Marbella
 
Matriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo boMatriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo bomariluzmonroymat
 
Como incrementar las ventas usando emailing correctamente existaya
Como incrementar las ventas usando emailing correctamente   existayaComo incrementar las ventas usando emailing correctamente   existaya
Como incrementar las ventas usando emailing correctamente existayaExistaya.com
 
Transistores
TransistoresTransistores
TransistoresSU Belesa
 
Modelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraModelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraeducación
 
The Effective Chapter
The Effective ChapterThe Effective Chapter
The Effective Chapterfgbmfi
 
Postpublicidad
PostpublicidadPostpublicidad
Postpublicidadamdia
 
Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008fsfarisya
 
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan REC:all project
 

Destaque (20)

Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7
 
Ganadores premio callao - peru
Ganadores premio   callao - peruGanadores premio   callao - peru
Ganadores premio callao - peru
 
Human Design by Leonora Bentley
Human Design by Leonora Bentley Human Design by Leonora Bentley
Human Design by Leonora Bentley
 
Juego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaJuego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didáctica
 
เมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลกเมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลก
 
HLABC Forum: Winter 2003
HLABC Forum: Winter 2003HLABC Forum: Winter 2003
HLABC Forum: Winter 2003
 
Bienaventuranzas del cuidado
Bienaventuranzas del cuidadoBienaventuranzas del cuidado
Bienaventuranzas del cuidado
 
ECOTIC
ECOTICECOTIC
ECOTIC
 
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
 
Matriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo boMatriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo bo
 
Como incrementar las ventas usando emailing correctamente existaya
Como incrementar las ventas usando emailing correctamente   existayaComo incrementar las ventas usando emailing correctamente   existaya
Como incrementar las ventas usando emailing correctamente existaya
 
Transistores
TransistoresTransistores
Transistores
 
Archive integration with RDF
Archive integration with RDFArchive integration with RDF
Archive integration with RDF
 
Modelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraModelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escritura
 
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
 
The Effective Chapter
The Effective ChapterThe Effective Chapter
The Effective Chapter
 
593
593593
593
 
Postpublicidad
PostpublicidadPostpublicidad
Postpublicidad
 
Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008
 
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
 

Semelhante a TOP10 Security Stories Of 2009

AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAmazon Web Services
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety Symantec
 
Writing Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesWriting Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesGodfrey Nolan
 
Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809mHealth Initiative
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDavid Rogers
 
Hacking Google Chrome OS
Hacking Google Chrome OSHacking Google Chrome OS
Hacking Google Chrome OSkosborn
 
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz Claudio Cinquepalmi
 
Screencasting to Enhance Teaching Materials
Screencasting to Enhance Teaching MaterialsScreencasting to Enhance Teaching Materials
Screencasting to Enhance Teaching MaterialsMichael Rees
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOSymphony.com
 
User Driven Product Strategy
User Driven Product StrategyUser Driven Product Strategy
User Driven Product StrategySatyajeet Singh
 
TenCube pitch deck 2010
TenCube pitch deck 2010TenCube pitch deck 2010
TenCube pitch deck 2010Tech in Asia
 
Zh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud ComputingZh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud Computingkevin liao
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledAmazon Web Services
 
Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010Harald Felgner, PhD
 
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate IntranetThe Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate IntranetMatt Hamilton
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomJohn Blossom
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataEMC
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsNowSecure
 
Mo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayMo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayJeremiah Grossman
 

Semelhante a TOP10 Security Stories Of 2009 (20)

AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Writing Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesWriting Secure Mobile Apps for Drones
Writing Secure Mobile Apps for Drones
 
Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Hacking Google Chrome OS
Hacking Google Chrome OSHacking Google Chrome OS
Hacking Google Chrome OS
 
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
 
Screencasting to Enhance Teaching Materials
Screencasting to Enhance Teaching MaterialsScreencasting to Enhance Teaching Materials
Screencasting to Enhance Teaching Materials
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
 
User Driven Product Strategy
User Driven Product StrategyUser Driven Product Strategy
User Driven Product Strategy
 
TenCube pitch deck 2010
TenCube pitch deck 2010TenCube pitch deck 2010
TenCube pitch deck 2010
 
Zh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud ComputingZh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud Computing
 
The Why and How of Mobile
The Why and How of MobileThe Why and How of Mobile
The Why and How of Mobile
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010
 
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate IntranetThe Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
 
Mo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayMo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat way
 

Mais de Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

Mais de Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

TOP10 Security Stories Of 2009

  • 1. State of Technology Security The Top 10 Security Stories Of 2009 web security | data security | email security © 2009 Websense, Inc. All rights reserved.
  • 2. The Top 10 Security Stories Of 2009 01 DECEMBER 2009 http://www.crn.com/security/222000125;jsessionid=GEDXH 5CL3BSKZQE1GHPCKHWATMY32JVN © 2009 Websense, Inc. All rights reserved. 2
  • 3. The Top Security Stories Of 2009 © 2009 Websense, Inc. All rights reserved. 3
  • 4. 1. Conficker Strikes © 2009 Websense, Inc. All rights reserved. 4
  • 5. 2. Heartland Breach Compromises… © 2009 Websense, Inc. All rights reserved. 5
  • 6. 3. U.S. Ramps Up Cybersecurity © 2009 Websense, Inc. All rights reserved. 6
  • 7. 4. Political Hactivists Make… © 2009 Websense, Inc. All rights reserved. 7
  • 8. 5. Apple iPhone Vulnerability © 2009 Websense, Inc. All rights reserved. 8
  • 9. 6. Symantec: Thompon Out, Salem In © 2009 Websense, Inc. All rights reserved. 9
  • 10. 7. McAfee Rebuilds Channel Bridges © 2009 Websense, Inc. All rights reserved. 10
  • 11. 8. Attackers Target Social Networks © 2009 Websense, Inc. All rights reserved. 11
  • 12. 9. TJX Hacker Indicted © 2009 Websense, Inc. All rights reserved. 12
  • 13. 10. Cloud Solutions Skyrocket © 2009 Websense, Inc. All rights reserved. 13
  • 14. Kontakt For yderligere information kontakt : Kim Rene Jensen Territory Manager Denmark, Faroe Island, Greenland +45 31668595 krjensen@websense.com Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen Følg Websense her : Facebook : http://www.facebook.com/websense Twitter : http://www.twitter.com/websense YouTube : http://www.youtube.com/watch?v=0RvGhgeg5mU © 2009 Websense, Inc. All rights reserved. 14