Search This Blog

Thursday, August 06, 2009

Case studies in working with law enforcement (Part 1)

Will AI in killer military robots lead to real Terminators?; XML flaw threatens apps built with Sun, Apache, Python and GNOME libraries
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sun Microsystems
rule

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.

rule

Spotlight Story
Case studies in working with law enforcement (Part 1)

Should we work with law enforcement when we encounter security breaches? Read full story

Related News:

Will AI in killer military robots lead to real Terminators?

XML flaw threatens apps built with Sun, Apache, Python and GNOME libraries
Security vendor Codenomicon has found flaws in XML parsers that enable denial-of-service attacks, corruption of data, and even delivery of a malicious payload.

Another security loophole for Facebook
New allocations of privacy violations by Facebook applications arose last week, which bring further into question the fast-growing -- but security lax -- Web site's ability to act as a secure authenticator.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Gartner: Load Balancers Are Dead
Gartner says it's time to ditch your load balancer for an application delivery controller (ADC). If you're still using load balancing technology of a decade ago, you're missing out. Improve application performance and security, increase the efficiency of your data center infrastructure and give your virtualized data center deployment a boost. You can meet all of these goals with a modern ADC.
Learn more now.


Data in Action: Effective data management for smarter outcomes
Date: August 19, 2009 Exhibit Zone 8:00 am PDT / 11:00 am EDT to 12:00 pm PDT / 3:00pm EDT Join us for a special, complimentary Virtual Conference, offering valuable information for lowering IT costs through industry-leading performance, enhanced storage compression and improved automation.
Register Now

 

August 06, 2009

TOP STORIES | MOST DUGG STORIES

  1. When error messages go public
  2. CEOs still getting big perks despite pay backlash
  3. BGP vulnerabilities in Cisco IOS
  4. Kevin Mitnick seeks refuge from hackers
  5. Conficker talk sanitized at Black Hat to protect investigation
  6. Fake ATM doesn't last long at hacker meet
  7. Korean 'journalists' booted from Defcon
  8. Black Hat 2009: How to hack a parking meter
  9. Nine things about botnets that will scare your pants off
  10. Some IT skills hot, even in down economy

Controlling Access to Privileged Accounts
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: