SlideShare une entreprise Scribd logo
1  sur  14
State of Technology Security
The Top 10 Security Stories Of 2009




web security | data security | email security   © 2009 Websense, Inc. All rights reserved.
The Top 10 Security Stories Of 2009


               01 DECEMBER 2009



http://www.crn.com/security/222000125;jsessionid=GEDXH
         5CL3BSKZQE1GHPCKHWATMY32JVN



                                           © 2009 Websense, Inc. All rights reserved.   2
The Top Security Stories Of 2009




                                   © 2009 Websense, Inc. All rights reserved.   3
1. Conficker Strikes




                       © 2009 Websense, Inc. All rights reserved.   4
2. Heartland Breach Compromises…




                                   © 2009 Websense, Inc. All rights reserved.   5
3. U.S. Ramps Up Cybersecurity




                                 © 2009 Websense, Inc. All rights reserved.   6
4. Political Hactivists Make…




                                © 2009 Websense, Inc. All rights reserved.   7
5. Apple iPhone Vulnerability




                                © 2009 Websense, Inc. All rights reserved.   8
6. Symantec: Thompon Out, Salem In




                                     © 2009 Websense, Inc. All rights reserved.   9
7. McAfee Rebuilds Channel Bridges




                                     © 2009 Websense, Inc. All rights reserved.   10
8. Attackers Target Social Networks




                                      © 2009 Websense, Inc. All rights reserved.   11
9. TJX Hacker Indicted




                         © 2009 Websense, Inc. All rights reserved.   12
10. Cloud Solutions Skyrocket




                                © 2009 Websense, Inc. All rights reserved.   13
Kontakt
For yderligere information kontakt :

   Kim Rene Jensen
   Territory Manager
   Denmark, Faroe Island, Greenland
   +45 31668595
   krjensen@websense.com
   Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen




Følg Websense her :

Facebook :       http://www.facebook.com/websense
Twitter :        http://www.twitter.com/websense
YouTube :        http://www.youtube.com/watch?v=0RvGhgeg5mU


                                                       © 2009 Websense, Inc. All rights reserved.   14

Contenu connexe

Tendances

Tendances (8)

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Security tips
Security tips Security tips
Security tips
 
Anti virus
Anti virusAnti virus
Anti virus
 
Umix
UmixUmix
Umix
 
Royal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz ReportRoyal Wedding: Social Media Buzz Report
Royal Wedding: Social Media Buzz Report
 
Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?Media and Technology: What's Around The Corner?
Media and Technology: What's Around The Corner?
 
How To Do Social Media Right - 2015
How To Do Social Media Right - 2015How To Do Social Media Right - 2015
How To Do Social Media Right - 2015
 

En vedette

Ganadores premio callao - peru
Ganadores premio   callao - peruGanadores premio   callao - peru
Ganadores premio callao - peru
Maria Tobon
 
Juego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaJuego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didáctica
Camilo Montes
 
Bienaventuranzas del cuidado
Bienaventuranzas del cuidadoBienaventuranzas del cuidado
Bienaventuranzas del cuidado
xaquintana
 
Matriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo boMatriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo bo
mariluzmonroymat
 
Transistores
TransistoresTransistores
Transistores
SU Belesa
 
Modelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraModelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escritura
educación
 
Postpublicidad
PostpublicidadPostpublicidad
Postpublicidad
amdia
 
Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008
fsfarisya
 

En vedette (20)

Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7Ilf Group En 2010 Rev7
Ilf Group En 2010 Rev7
 
Ganadores premio callao - peru
Ganadores premio   callao - peruGanadores premio   callao - peru
Ganadores premio callao - peru
 
Human Design by Leonora Bentley
Human Design by Leonora Bentley Human Design by Leonora Bentley
Human Design by Leonora Bentley
 
Juego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didácticaJuego de rol cesar iii investigación de su calidad didáctica
Juego de rol cesar iii investigación de su calidad didáctica
 
เมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลกเมื่อข้อมูลกำลังจะล้นโลก
เมื่อข้อมูลกำลังจะล้นโลก
 
HLABC Forum: Winter 2003
HLABC Forum: Winter 2003HLABC Forum: Winter 2003
HLABC Forum: Winter 2003
 
Bienaventuranzas del cuidado
Bienaventuranzas del cuidadoBienaventuranzas del cuidado
Bienaventuranzas del cuidado
 
ECOTIC
ECOTICECOTIC
ECOTIC
 
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
Instituto San Telmo en Negocio Abierto de CIT Marbella en Hydros Hotel
 
Matriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo boMatriz de evaluación gestión 2011 vo bo
Matriz de evaluación gestión 2011 vo bo
 
Como incrementar las ventas usando emailing correctamente existaya
Como incrementar las ventas usando emailing correctamente   existayaComo incrementar las ventas usando emailing correctamente   existaya
Como incrementar las ventas usando emailing correctamente existaya
 
Transistores
TransistoresTransistores
Transistores
 
Archive integration with RDF
Archive integration with RDFArchive integration with RDF
Archive integration with RDF
 
Modelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escrituraModelo de doble_ruta_lectura_y_escritura
Modelo de doble_ruta_lectura_y_escritura
 
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
Enunciados Examenes Selectividad Matematicas II Andalucia 2002-2013
 
The Effective Chapter
The Effective ChapterThe Effective Chapter
The Effective Chapter
 
593
593593
593
 
Postpublicidad
PostpublicidadPostpublicidad
Postpublicidad
 
Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008
 
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
Rationalise, Response, Results - Keynote Presentation by Dr. Daniel Tan
 

Similaire à TOP10 Security Stories Of 2009

User Driven Product Strategy
User Driven Product StrategyUser Driven Product Strategy
User Driven Product Strategy
Satyajeet Singh
 
Mo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayMo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat way
Jeremiah Grossman
 

Similaire à TOP10 Security Stories Of 2009 (20)

AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Writing Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesWriting Secure Mobile Apps for Drones
Writing Secure Mobile Apps for Drones
 
Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809Clinical Grade Email Peters M Hi091809
Clinical Grade Email Peters M Hi091809
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Hacking Google Chrome OS
Hacking Google Chrome OSHacking Google Chrome OS
Hacking Google Chrome OS
 
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
 
Screencasting to Enhance Teaching Materials
Screencasting to Enhance Teaching MaterialsScreencasting to Enhance Teaching Materials
Screencasting to Enhance Teaching Materials
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
 
User Driven Product Strategy
User Driven Product StrategyUser Driven Product Strategy
User Driven Product Strategy
 
TenCube pitch deck 2010
TenCube pitch deck 2010TenCube pitch deck 2010
TenCube pitch deck 2010
 
Zh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud ComputingZh Tw Introduction To Cloud Computing
Zh Tw Introduction To Cloud Computing
 
The Why and How of Mobile
The Why and How of MobileThe Why and How of Mobile
The Why and How of Mobile
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010Phones are the new PCs. & the Red Fez Playbook, November 2010
Phones are the new PCs. & the Red Fez Playbook, November 2010
 
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate IntranetThe Flexibility of Open Source: A Case Study of a large Corporate Intranet
The Flexibility of Open Source: A Case Study of a large Corporate Intranet
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
 
Mo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat wayMo' Money Mo' Problems - Making even more money online the black hat way
Mo' Money Mo' Problems - Making even more money online the black hat way
 

Plus de Kim Jensen

Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
Kim Jensen
 

Plus de Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

TOP10 Security Stories Of 2009

  • 1. State of Technology Security The Top 10 Security Stories Of 2009 web security | data security | email security © 2009 Websense, Inc. All rights reserved.
  • 2. The Top 10 Security Stories Of 2009 01 DECEMBER 2009 http://www.crn.com/security/222000125;jsessionid=GEDXH 5CL3BSKZQE1GHPCKHWATMY32JVN © 2009 Websense, Inc. All rights reserved. 2
  • 3. The Top Security Stories Of 2009 © 2009 Websense, Inc. All rights reserved. 3
  • 4. 1. Conficker Strikes © 2009 Websense, Inc. All rights reserved. 4
  • 5. 2. Heartland Breach Compromises… © 2009 Websense, Inc. All rights reserved. 5
  • 6. 3. U.S. Ramps Up Cybersecurity © 2009 Websense, Inc. All rights reserved. 6
  • 7. 4. Political Hactivists Make… © 2009 Websense, Inc. All rights reserved. 7
  • 8. 5. Apple iPhone Vulnerability © 2009 Websense, Inc. All rights reserved. 8
  • 9. 6. Symantec: Thompon Out, Salem In © 2009 Websense, Inc. All rights reserved. 9
  • 10. 7. McAfee Rebuilds Channel Bridges © 2009 Websense, Inc. All rights reserved. 10
  • 11. 8. Attackers Target Social Networks © 2009 Websense, Inc. All rights reserved. 11
  • 12. 9. TJX Hacker Indicted © 2009 Websense, Inc. All rights reserved. 12
  • 13. 10. Cloud Solutions Skyrocket © 2009 Websense, Inc. All rights reserved. 13
  • 14. Kontakt For yderligere information kontakt : Kim Rene Jensen Territory Manager Denmark, Faroe Island, Greenland +45 31668595 krjensen@websense.com Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen Følg Websense her : Facebook : http://www.facebook.com/websense Twitter : http://www.twitter.com/websense YouTube : http://www.youtube.com/watch?v=0RvGhgeg5mU © 2009 Websense, Inc. All rights reserved. 14