Search This Blog

Friday, August 07, 2009

Apple patches 18 Mac vulnerabilities, ships OS X 10.5.8

IBM gets $16 million to bolster its brain-on-a-chip technology; Five ways to get affordable certification skills
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Quest Software, Inc.
rule

Realize Significant Storage Cost Savings with Automation
Dramatically increase storage utilization with a system that automates storage capacity management. Benefits include: Identifying and redirecting dark storage, allowing data to grow into existing storage safely, the ability to reclaim over-provisioned storage, a fast return on investment. Don't let storage unnecessarily drain your IT budget.

rule

Spotlight Story
Apple patches 18 Mac vulnerabilities, ships OS X 10.5.8

Apple on Wednesday patched 18 vulnerabilities in Mac OS X, including half a dozen that could let hackers hijack machines, and released Mac OS X 10.5.8. Read full story

Related News:

IBM gets $16 million to bolster its brain-on-a-chip technology
IBM has now gotten $21 million to work on the program known as Systems of neuromorphic adaptive plastic scalable electronics (SyNAPSE) which includes researchers from HRL Laboratories, which got $16.2 million in Oct. 2008, and others such as HP.

Five ways to get affordable certification skills
Training is often among the first items cut from budgets when companies need to trim expenses. Industry watchers and IT professionals share tips on how to get certification-level IT skills with little cash.

The cybersecurity job no one really wants
Eight weeks after President Obama announced a White House cybersecurity office, no one has been named to lead the office yet, and some wonder if the delay is because there are few takers for the job as outlined.

Expect hacker attacks on XML flaws, analyst warns
One day after reports of vulnerabilities in XML libraries, an analyst is warning companies not to ignore the danger of attacks that exploit those flaws.

Security job security
It's a good time to work in the security field. Nemertes has completed it's research benchmark for the first half of 2009, incorporating interviews with IT and security executives during a recession. The research participants told us that they consider security and compliance spending to be "recession proof", third only to data network and voice/telecom spending.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Avoiding Security Breaches
Discover effective tools and strategies for gaining regulatory compliance, avoiding security breaches and enforcing tight security. Learn how to recover from a data breach, the latest in security best practices, how you can achieve compliance while saving money, and more.
Click here to continue.


Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.
Building a Successful Security Operations Center

 

August 07, 2009

TOP STORIES | MOST DUGG STORIES

  1. Google gives 'Voice' to military personnel
  2. When error messages go public
  3. Windows 7: Four reasons to upgrade, four reasons to stay away
  4. XML flaw threatens apps built with Sun, Apache, Python libraries
  5. Kevin Mitnick seeks refuge from hackers
  6. Employee reviews on Glassdoor.com slam Cisco
  7. Top tech rollercoasters
  8. Verizon slashes smartphone prices
  9. Google thinks BlackBerry is ripe for picking
  10. BGP vulnerabilities in Cisco IOS

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.
Identity Management: complexity made simple



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: