Unisys targets secure cloud computing Unisys is announcing Tuesday a new set of services in the area of secure cloud computing aimed at addressing customers' security concerns about moving their applications and data to an external cloud. 'Swatting' case shows need to ban caller-ID spoofing What Matthew Weigman and his cohorts did went so far beyond "pranks" -- or even hacking -- as to leave little room to question the sentence he received yesterday. From an IDG News Service story on our site: Government criticised for plan to hire 'naughty boys' The security minister Lord West has been slammed for hinting that former hackers are being recruited by Britain's security forces to help protect IT infrastructure from malicious online forces. Hacking Exposed author reveals his security secrets Just what motivates the bad-guys to hack into a computer or network infrastructure? According to Stuart McClure, vice-president of operations, strategy for McAfee Inc.'s risk and compliance business unit, and one of the authors of the book Hacking Exposed: Network Security Secrets & Solutions, malicious intent, combined with design flaws, misused functionality and poor common sense are what cause these attacks to happen. Obama's Cybersecurity Push: What It Means for CIOs Happy Birthday, America. We're not as safe as we think. From the electricity grid to the banking system to the defense contractors building our most sophisticated weapons, computers running the nation's critical infrastructure see relentless attacks from criminals and countries alike. Sometimes we hear about it, sometimes we don't. June Giveaways Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30. Network World on Twitter? You bet we are |
No comments:
Post a Comment