SlideShare une entreprise Scribd logo
1  sur  14
State of Technology Security
The Top 10 Security Stories Of 2009




web security | data security | email security   © 2009 Websense, Inc. All rights reserved.
The Top 10 Security Stories Of 2009


               01 DECEMBER 2009



http://www.crn.com/security/222000125;jsessionid=GEDXH
         5CL3BSKZQE1GHPCKHWATMY32JVN



                                           © 2009 Websense, Inc. All rights reserved.   2
The Top Security Stories Of 2009




                                   © 2009 Websense, Inc. All rights reserved.   3
1. Conficker Strikes




                       © 2009 Websense, Inc. All rights reserved.   4
2. Heartland Breach Compromises…




                                   © 2009 Websense, Inc. All rights reserved.   5
3. U.S. Ramps Up Cybersecurity




                                 © 2009 Websense, Inc. All rights reserved.   6
4. Political Hactivists Make…




                                © 2009 Websense, Inc. All rights reserved.   7
5. Apple iPhone Vulnerability




                                © 2009 Websense, Inc. All rights reserved.   8
6. Symantec: Thompon Out, Salem In




                                     © 2009 Websense, Inc. All rights reserved.   9
7. McAfee Rebuilds Channel Bridges




                                     © 2009 Websense, Inc. All rights reserved.   10
8. Attackers Target Social Networks




                                      © 2009 Websense, Inc. All rights reserved.   11
9. TJX Hacker Indicted




                         © 2009 Websense, Inc. All rights reserved.   12
10. Cloud Solutions Skyrocket




                                © 2009 Websense, Inc. All rights reserved.   13
Kontakt
For yderligere information kontakt :

   Kim Rene Jensen
   Territory Manager
   Denmark, Faroe Island, Greenland
   +45 31668595
   krjensen@websense.com
   Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen




Følg Websense her :

Facebook :       http://www.facebook.com/websense
Twitter :        http://www.twitter.com/websense
YouTube :        http://www.youtube.com/watch?v=0RvGhgeg5mU


                                                       © 2009 Websense, Inc. All rights reserved.   14

Contenu connexe

Tendances

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber ThreatsAaron Vick
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
 
Royal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz ReportRoyal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz ReportGoldbach Group AG
 
Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?Stavros Drakoularakos
 

Tendances (8)

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Security tips
Security tips Security tips
Security tips
 
Anti virus
Anti virusAnti virus
Anti virus
 
Umix
UmixUmix
Umix
 
Royal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz ReportRoyal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz Report
 
Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?
 
How To Do Social Media Right - 2015
How To Do Social Media Right - 2015How To Do Social Media Right - 2015
How To Do Social Media Right - 2015
 

En vedette

Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7TerryPearce
 
Ganadores premio callao - peru
Ganadores premio   callao - peruGanadores premio   callao - peru
Ganadores premio callao - peruMaria Tobon
 
Human Design by Leonora Bentley
Human Design by Leonora Bentley Human Design by Leonora Bentley
Human Design by Leonora Bentley Xtraordinary Women
 
Juego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaJuego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaCamilo Montes
 
เมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลกเมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลกGuangming Sangkeettrakarn
 
Bienaventuranzas del cuidado
Bienaventuranzas del cuidadoBienaventuranzas del cuidado
Bienaventuranzas del cuidadoxaquintana
 
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel CIT Marbella
 
Matriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo boMatriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo bomariluzmonroymat
 
Como incrementar las ventas usando emailing correctamente existaya
Como incrementar las ventas usando emailing correctamente   existayaComo incrementar las ventas usando emailing correctamente   existaya
Como incrementar las ventas usando emailing correctamente existayaExistaya.com
 
Transistores
TransistoresTransistores
TransistoresSU Belesa
 
Modelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraModelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraeducación
 
The Effective Chapter
The Effective ChapterThe Effective Chapter
The Effective Chapterfgbmfi
 
Postpublicidad
PostpublicidadPostpublicidad
Postpublicidadamdia
 
Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008fsfarisya
 
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan REC:all project
 

En vedette (20)

Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7
 
Ganadores premio callao - peru
Ganadores premio   callao - peruGanadores premio   callao - peru
Ganadores premio callao - peru
 
Human Design by Leonora Bentley
Human Design by Leonora Bentley Human Design by Leonora Bentley
Human Design by Leonora Bentley
 
Juego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaJuego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didáctica
 
เมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลกเมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลก
 
HLABC Forum: Winter 2003
HLABC Forum: Winter 2003HLABC Forum: Winter 2003
HLABC Forum: Winter 2003
 
Bienaventuranzas del cuidado
Bienaventuranzas del cuidadoBienaventuranzas del cuidado
Bienaventuranzas del cuidado
 
ECOTIC
ECOTICECOTIC
ECOTIC
 
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
 
Matriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo boMatriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo bo
 
Como incrementar las ventas usando emailing correctamente existaya
Como incrementar las ventas usando emailing correctamente   existayaComo incrementar las ventas usando emailing correctamente   existaya
Como incrementar las ventas usando emailing correctamente existaya
 
Transistores
TransistoresTransistores
Transistores
 
Archive integration with RDF
Archive integration with RDFArchive integration with RDF
Archive integration with RDF
 
Modelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraModelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escritura
 
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
 
The Effective Chapter
The Effective ChapterThe Effective Chapter
The Effective Chapter
 
593
593593
593
 
Postpublicidad
PostpublicidadPostpublicidad
Postpublicidad
 
Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008
 
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
 

Similaire à TOP10 Security Stories Of 2009

AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAmazon Web Services
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety Symantec
 
Writing Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesWriting Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesGodfrey Nolan
 
Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809mHealth Initiative
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDavid Rogers
 
Hacking Google Chrome OS
Hacking Google Chrome OSHacking Google Chrome OS
Hacking Google Chrome OSkosborn
 
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz Claudio Cinquepalmi
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOSymphony.com
 
User Driven Product Strategy
User Driven Product StrategyUser Driven Product Strategy
User Driven Product StrategySatyajeet Singh
 
TenCube pitch deck 2010
TenCube pitch deck 2010TenCube pitch deck 2010
TenCube pitch deck 2010Tech in Asia
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledAmazon Web Services
 
Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010Harald Felgner, PhD
 
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate IntranetThe Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate IntranetMatt Hamilton
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomJohn Blossom
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataEMC
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsNowSecure
 
Mo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayMo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayJeremiah Grossman
 
E sky enum presentation for prospects and customers slideshow v20101128
E sky enum presentation for prospects and customers slideshow v20101128E sky enum presentation for prospects and customers slideshow v20101128
E sky enum presentation for prospects and customers slideshow v20101128e-sky, Inc
 
esky enum presentation for prospects and customers
esky enum presentation for prospects and customersesky enum presentation for prospects and customers
esky enum presentation for prospects and customerse-sky, Inc
 

Similaire à TOP10 Security Stories Of 2009 (20)

AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Writing Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesWriting Secure Mobile Apps for Drones
Writing Secure Mobile Apps for Drones
 
Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Hacking Google Chrome OS
Hacking Google Chrome OSHacking Google Chrome OS
Hacking Google Chrome OS
 
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
 
User Driven Product Strategy
User Driven Product StrategyUser Driven Product Strategy
User Driven Product Strategy
 
TenCube pitch deck 2010
TenCube pitch deck 2010TenCube pitch deck 2010
TenCube pitch deck 2010
 
The Why and How of Mobile
The Why and How of MobileThe Why and How of Mobile
The Why and How of Mobile
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010
 
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate IntranetThe Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
 
Mo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayMo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat way
 
E sky enum presentation for prospects and customers slideshow v20101128
E sky enum presentation for prospects and customers slideshow v20101128E sky enum presentation for prospects and customers slideshow v20101128
E sky enum presentation for prospects and customers slideshow v20101128
 
esky enum presentation for prospects and customers
esky enum presentation for prospects and customersesky enum presentation for prospects and customers
esky enum presentation for prospects and customers
 

Plus de Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

Plus de Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Dernier

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 

Dernier (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 

TOP10 Security Stories Of 2009

  • 1. State of Technology Security The Top 10 Security Stories Of 2009 web security | data security | email security © 2009 Websense, Inc. All rights reserved.
  • 2. The Top 10 Security Stories Of 2009 01 DECEMBER 2009 http://www.crn.com/security/222000125;jsessionid=GEDXH 5CL3BSKZQE1GHPCKHWATMY32JVN © 2009 Websense, Inc. All rights reserved. 2
  • 3. The Top Security Stories Of 2009 © 2009 Websense, Inc. All rights reserved. 3
  • 4. 1. Conficker Strikes © 2009 Websense, Inc. All rights reserved. 4
  • 5. 2. Heartland Breach Compromises… © 2009 Websense, Inc. All rights reserved. 5
  • 6. 3. U.S. Ramps Up Cybersecurity © 2009 Websense, Inc. All rights reserved. 6
  • 7. 4. Political Hactivists Make… © 2009 Websense, Inc. All rights reserved. 7
  • 8. 5. Apple iPhone Vulnerability © 2009 Websense, Inc. All rights reserved. 8
  • 9. 6. Symantec: Thompon Out, Salem In © 2009 Websense, Inc. All rights reserved. 9
  • 10. 7. McAfee Rebuilds Channel Bridges © 2009 Websense, Inc. All rights reserved. 10
  • 11. 8. Attackers Target Social Networks © 2009 Websense, Inc. All rights reserved. 11
  • 12. 9. TJX Hacker Indicted © 2009 Websense, Inc. All rights reserved. 12
  • 13. 10. Cloud Solutions Skyrocket © 2009 Websense, Inc. All rights reserved. 13
  • 14. Kontakt For yderligere information kontakt : Kim Rene Jensen Territory Manager Denmark, Faroe Island, Greenland +45 31668595 krjensen@websense.com Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen Følg Websense her : Facebook : http://www.facebook.com/websense Twitter : http://www.twitter.com/websense YouTube : http://www.youtube.com/watch?v=0RvGhgeg5mU © 2009 Websense, Inc. All rights reserved. 14