US Air Force phishing test transforms into a problem | Security pros, meet your new best friend: the CFO | ||||||||||
Network World Compliance | ||||||||||
Tips for using Twitter, Facebook and other "anti-social networks" WHITE PAPER: ArcSight Building a Successful Security Operations Center This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center In this Issue
WHITE PAPER: Microsoft Extended Security Features of Windows 7 Microsoft has added significant security enhancement to Windows 7. This Gartner research note details the capabilities available (many are only available to EA/SA subscribers), which features should be activated and where some security holes still remain. Read More. US Air Force phishing test transforms into a problem Security pros, meet your new best friend: the CFO Symantec encryption buyouts raise open source, overlap questions Diary of a mad McAfee antivirus victim Symantec buying PGP Corp., GuardianEdge for $370 million WHITE PAPER: ManageEngine 5 Keys to Preventing Application Delay Examine the 6 challenges organizations face from application delays, as well as the 5 capabilities needed to effectively address and overcome problems. Read More New tool makes end users responsible for data loss prevention Inside Oracle's security assurance program Terry Childs juror explains why he voted to convict PDF exploits explode, continue climb in 2010 What's wrong with the PCI security standard WHITE PAPER: Fluke Networks Ethernet Performance Metrics Ethernet performance measurement can help. Various metrics can quantify and characterize performance. Test plans can be written to satisfy varying organizational objectives. This white paper will describe advancements in field measurement of end-to-end Ethernet performance. Read More! Encryption high-priority for Massachusetts Smartphone management becoming a nightmare Computer contractor gets five years for $2M credit union theft Glype 'anonymous' proxy may not cloak your identity Researcher: Social networks shouldn't reuse private info Opt-in ISP-level Internet filter wasn't feasible: Academics Google patches Chrome for second time this month | ||||||||||
Join us on LinkedIn Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today! Today from the Subnet communities 15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too. SLIDESHOWS Confessions of tech hoarders Interop history quiz MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, April 30, 2010
Tips for using "anti-social" networks; US Air Force caught in own phishing net
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment