Federal watchdogs outline 6 critical electricty grid cybersecurity challenges | Kama Sutra malware threatens to put Windows users in awkward position | ||||||||||
Network World Security | ||||||||||
Microsoft needs to get in front of WP7 glitch, pronto WHITE PAPER: Quantum Corporation Long-Term Data Retention Key Considerations Managing backup and recovery in today's environment is a multi-dimensional challenge with both near and long-term business requirements. Recent technological developments in disk backup have had a positive impact on short-term data retention strategy. This tool provides key topics to think about as you design your long-term data retention plans. Read Now In this Issue
WEBCAST: Cisco Mobile Powerplay: Secure, High Performance, Unified The mobile revolution is hereand here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now Federal watchdogs outline 6 critical electricty grid cybersecurity challenges Kama Sutra malware threatens to put Windows users in awkward position 2011's 25 Geekiest 25th Anniversaries WHITE PAPER: ParAccel Tackle the Most Challenging Analytic Queries Learn how a columnar-based, massively parallel processing database can provide ultra fast analytics with: Schema-neutral, load-and-go analysis High performance against complex SQL workloads All-in-memory processing Read now! Spectrum analyzer catches exam cheats in Taiwan Sony asks for restraining order over PS3 hack Survey on PCI: How it's impacting network security WHITE PAPER: ArcSight Building a Successful Security Operations Center This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center Hoax smartphone apps: a security headache in 2011 Obama Administration fleshes out online trusted IDs Security firm: Facebook is biggest mobile malware threat Microsoft turns to creative tactic to block IE attacks | ||||||||||
BECOME AN INSIDER SLIDESHOWS The weirdest, wackiest and stupidest sci/tech stories of 2010 2010's most popular iPad apps MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, January 13, 2011
Microsoft needs to get in front of WP7 glitch, pronto
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment