Privacy Wars: How to Hide While Google is Watching You | Zeus malware used pilfered digital certificate | ||||||||||
Network World Security | ||||||||||
Smartphone wave challenges enterprise security WHITE PAPER: MessageLabs Gartner Magic Quadrant for Secure Email Gateway This industry report covers the email gateway market. Gartner, Inc. positions Symantec Hosted Services in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). Read the entire report. Read Now In this Issue
WHITE PAPER: Quest Software Choosing the Right Active Directory Bridge Solution for You A solid Active Directory (AD) bridge in your diverse IT environment allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords for improved security and productivity (and reduced complexity and cost). Read More Privacy Wars: How to Hide While Google is Watching You Zeus malware used pilfered digital certificate IT security auditors are NOT evil and could keep you from getting hacked WHITE PAPER: Cisco Learn the 3 Best Practices for Securing E-mail Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now! More than 1 in 10 Mozilla bug finders turn down cash Mozilla plans to silently update Firefox Adobe Scrambles to Fix PDF Flaw WHITE PAPER: NetApp ESG Report: Driving storage efficiency in SAN environments This ESG paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs. Read More! Web add-ons compromise 'private browsing' Employees ignore IT security: survey DHS quietly dispatching teams to test power plant cybersecurity | ||||||||||
Join us on LinkedIn Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today! Books for you from Microsoft Subnet and Cisco Subnet Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today! SLIDESHOWS Nine real iPad alternatives Defcon badge is unlike anything you have ever seen MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, August 09, 2010
Smartphone wave challenges enterprise security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment