GoDaddy: We're ready to secure .com names with DNSSEC | Intel's McAfee unit to acquire Sentrigo | ||||||||||
Network World Security | ||||||||||
Does RSA SecurID have a U.S gov't-authorized back door? VIDEO: Cymphonix Gartner Video: Secure & Control Internet Traffic In this video, three leading experts from Gartner, Hitachi Consulting and Cymphonix discuss the critical factors for evaluating and deploying a Secure Web Gateway to address the growth in connected applications and media-rich websites, as well as increasingly sophisticated malware threats and evasion techniques. Learn More! In this Issue
WEBCAST: Palo Alto Networks Forrester: Zero-Trust Architecture Discussion In this video, John Kindervag, Senior Analyst, Forrester Research defines "zero-trust architecture", outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture". Read now! GoDaddy: We're ready to secure .com names with DNSSEC Intel's McAfee unit to acquire Sentrigo WHITE PAPER: Ultrium LTO Securing Sensitive Information Encryption of tape data can safeguard information. Implementing LTO-4 tape drive encryption is a relatively simple process and ensures that sensitive data is anatomically secured with no tape performance penalty. Read the latest advances in encryption technology and the questions to ask regarding key management. Read now Analysts: Firefox 4 security a step up Firm points finger at Iran for SSL certificate theft WHITE PAPER: Dell PCI 2.0: What's New? What Matters? What's Left? The inclusion of virtualization in PCI 2.0 demonstrates that the PCI DSS standard can keep pace with new technologies. This paper discusses what's new in PCI 2.0 and offers guidance on closing gaps that still need attention particularly in the areas of storage encryption, wireless networking, and physical security. Learn more. The RSA Breach: Lessons Learned for Enterprise Organizations Emerging iPhone, iPad 2 App Enables Remote Surveillance The Russian Cybermafia: Boa Factory & CarderPlanet | ||||||||||
GOODIES FROM THE SUBNETS SLIDESHOWS Perks drive up pay for tech CEOs First look at Microsoft Internet Explorer 9 MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, March 24, 2011
Does RSA SecurID have a U.S gov't-authorized back door?
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment