Search This Blog

Tuesday, August 18, 2009

IEEE program brings security vendors together

Georgia cyberattacks linked to Russian organized crime; Hiring hackers (part 2)
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Radware
rule

Boost Your Immunity with New DefensePro!
New models of DefensePro offer on demand IPS scalability and behavioral protection up to more than 12Gbps for unmatched Data Center security performance and lowest TCO. Your Best Defense for a Healthy Network Just Got Better. Learn More

Learn More Now

rule

Spotlight Story
IEEE program brings security vendors together

The IEEE standards group today announced an effort to bring security vendors together to collaborate on early-stage technologies. Read full story

Related News:

Georgia cyberattacks linked to Russian organized crime
The cyberattacks against Georgia a year ago were conducted in close connection with Russian criminal gangs, and the attackers likely were tipped off about Russia's intent to invade the country, according to a new technical analysis, much of which remains secret.

Hiring hackers (part 2)
This is the second of a two-part series on hiring hackers and criminal hackers into information technology (IT) groups as programmers, network administrators and security personnel.

Tokenization vs. end-to-end encryption
Over the last few months, the PCI Knowledge Base has been doing research on the impact of PCI compliance on fraud and fraud management for the Merchant Risk Council. One of the things we've learned is that, in general, the PCI-mandated controls are most effective at reducing internal fraud due to insider threat.

Wicked tiny laser could radically alter computers, sensors, imaging
Researchers today said they have created the world's smallest laser -- more than 1 million could fit inside a red blood cell -- that could help speed computers, sensors and imaging all by using light instead of electrons to process information.

IBM scientists build computer chips from DNA
Scientists at IBM are experimenting with using DNA molecules as a way to create tiny circuits that could form the basis of smaller, more powerful computer chips.

Hackers put social networks such as Twitter in crosshairs
Web sites such as Twitter are becoming increasingly favored by hackers as places to plant malicious software in order to infect computers, according to a new study covering Web application security vulnerabilities.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year.
IDC: Realizing the Benefits of Deduplication


Top-line performance that's bottom-line efficient
Six-Core AMD Opteron Processor based servers balance the power to handle demanding workloads with energy efficiency and superior value.
Top-line performance that's bottom-line efficient

 

August 18, 2009

TOP STORIES | MOST DUGG STORIES

  1. Apple disasters
  2. When Apple flops: The worst products of all time
  3. Microsoft IE 8 shines in Web browser security test
  4. The 10 most idiotic iPhone apps
  5. The 10 worst video game systems of all time
  6. Large broadband providers pass up stimulus funding
  7. 10 cool things you didn't know about Google
  8. Twitter used to manage botnet, says security expert
  9. Windows 7 RTM -- a closer look
  10. FAQ: How to get Windows 7 on the cheap

Beyond ROI Calculators: Real-World Security Savings
See how WatchGuard's security solutions could have saved two organizations millions if in place prior to the headline-making cyber attacks both experienced. These solutions could have mitigated or prevented the breaches entirely. Get the facts and realize how to effectively address your real-world security problems today.
Click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: