Search This Blog

Wednesday, September 16, 2009

Twitter no substitute for blogging

Businesses turn to DNS service to filter the Web; Companies patch OS holes, but biggest priority should be apps
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Lockheed Martin Corp.
rule

Discover a Career at Lockheed Martin.
Cyber Security. Software Engineering. RF/Radar. Photonics. Contract Management. Dream the biggest dreams and discover what's possible in a career at Lockheed Martin. Click here to start learning how.

Learn More Now

rule

Spotlight Story
Twitter no substitute for blogging

Where have all the bloggers gone? As recently as a year ago much of what inspired these newsletters came from the blog postings of those I considered thought leaders in identity management. Those blogs have been very quiet lately. Read full story

Related News:

Businesses turn to DNS service to filter the Web
For National Veterinary Associates, the decision to block the Web was sealed with a virus.

Companies patch OS holes, but biggest priority should be apps
Corporations appear to be much slower in patching their applications than their operating systems, even though attackers are mainly targeting application vulnerabilities, according to a new report based on data from TippingPoint, Qualys and the SANS Institute.

New York Times tricked into serving scareware ad
Scammers tricked the New York Times' Digital Advertising department into placing a malicious ad for fake antivirus software on the NYTimes.com Web site over the weekend, the company confirmed Monday.

Company hosting Joe Wilson fundraising site recovers from DDoS attack
A company providing online payment-processing services for U.S. Rep. Joe Wilson (R-S.C) is back online after being disrupted by a distributed denial-of service attack over the weekend.

Can mainframe use really grow?
Many IBM mainframe users reported plan another wave of investments in the System z platform over the next 2–5 years.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Discover a Career at Lockheed Martin.
Cyber Security. Software Engineering. RF/Radar. Photonics. Contract Management. Dream the biggest dreams and discover what's possible in a career at Lockheed Martin. Click here to start learning how.
Learn More Now


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 16, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft greasing Win 7 skids with early release of desktop tools
  2. Domain-name abuse proliferates
  3. Windows 7 touch: Dead on arrival
  4. Sprint CEO calls the iPhone the "Michael Jordan" of smartphones
  5. IEEE stamps "approved" on 802.11n Wi-Fi standard
  6. Developer denies software to beat Chinese censors is malicious
  7. Avaya wins Nortel enterprise business for $900 million
  8. A tale of two college Wi-Fi networks and 802.11n
  9. 10 cool Web apps developed in two days
  10. Ethernet switch vendors propose data center collapse

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: