Search This Blog

Monday, August 03, 2009

Catalyst Conference tackles terminology

Four tech spats that could be settled over a beer with Obama; Pervasive encryption and key management
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Tripwire
rule

Easily Keep Pace with HIPPA Changes
New federal personal health care information security rules have been signed into law. How will they affect and intersect with HIPAA regulations? How could they influence current compliance and your infrastructure?

rule

Spotlight Story
Catalyst Conference tackles terminology

Read full story

Related News:

Four tech spats that could be settled over a beer with Obama
If sitting down with the President of the United States and quaffing a few brewskis can really help tamp down controversy over a highly-charged race issue then perhaps the President could pull up a bar stool and settle some far less vital disagreements plaguing the tech industry. Here we go:

Pervasive encryption and key management

Twitter, Linux, Red Hat, Microsoft "honored" with Pwnie Awards
Think of the annual Pwnie Awards delivered at the Black Hat conference as a geek version of the Oscars – if they were combined with the tongue-in-cheek Razzies that celebrate the worst of Hollywood. Twitter, Linux and Red Hat were among honorees that didn't go unscathed this time around.

iPhone virus: What you need to know
The iPhone's security flaws were laid bare at the Black Hat Conference in Las Vegas yesterday, and now the smartphone-clutching public has boiled itself into a frenzy. But how serious is this supposed iPhone virus, and what can be done to protect your iPhone from infection? Here is what we know, and why you probably shouldn't worry.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Red Hat Enterprise Linux on IBM System z: Virtualization that Drives Cost Savings
IBM and Red Hat together offer a world-class platform for virtualization that allows you to do more with less, dramatically shift your IT cost structure, and manage the growth and increasing complexity of your business.
Red Hat Enterprise Linux on IBM System z: Virtualization that Drives Cost Savings


 

August 03, 2009

TOP STORIES | MOST DUGG STORIES

  1. iPhone SMS attack to be unleashed at Black Hat
  2. Mystery solved: MS emergency patch precedes Black Hat session
  3. Clampi Trojan plunders financials for botnet
  4. CERT and ISC warn about BIND9 DNS vulnerability
  5. 5 technologies Iran is using to censor the Web
  6. Microsoft-Yahoo will change cloud computing
  7. Cloud computing confusion reigns in U.S. government
  8. Black Hat's most notorious incidents
  9. What business is Cisco in today?
  10. Cisco fixes critical WLAN flaws

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: