| When Rogue IT Staffers Attack: 8 Organizations That Got Burned Here are eight cases of IT staffers using their insider knowledge for other purposes. Security experts scramble to decipher Twitter attack Security analysts scrambled to find a motive behind the distributed denial-of-service attacks that brought down Twitter for several hours, and also hit Facebook, Google and LiveJournal. 5 Lessons from Dark Side of Cloud Computing While many companies are considering moving applications to the cloud, the security of the third-party services still leaves much to be desired, security experts warned attendees at last week's Black Hat Security Conference. Pressure on Obama to move fast on cybersecurity appointment Melissa Hathaway's decision to step down as acting senior director for cyberspace at the National Security Council could increase pressure on the Obama Administration to quickly find someone to serve as the White House cybersecurity coordinator. Hardware Firewalls Bring Security to Small Businesses Think your business is too small for a serious security appliance? The truth may surprise you. For less than $500, a simple unified gateway device can protect even tiny offices from the very real threats posed by malware and hackers. August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment