Symantec finds fake Google Android update | NASA eyes prototype system to control drones in national airspace | ||||||||||
Network World Security | ||||||||||
Pwn2Own 2011: Hackers Shame Safari and IE8 on Day One ARTICLE: BMC Sun Chemical Manages Complex Batch See how the world's largest producer of printing inks and pigments, Sun Chemical Corporation, uses the advanced enterprise scheduling capabilities of BMC Control-M to keep complex business-critical batch processes running effortlessly. Sun IT lead: "Without it, we would need at least three times the number of people in our team." Learn More Now! In this Issue
WHITE PAPER: Ultrium LTO Tape Fallacies Exposed Misinformation about tape storage abounds. Most strewn about by a few disk-only proponents. Tape storage continues to play a vital role for data protection. David Hill of the Mesabi Group sheds light on the most common misperceptions. Read now Symantec finds fake Google Android update NASA eyes prototype system to control drones in national airspace Researchers warn browser users over new SpyEye/ZeuS trojan Google's Chrome untouched at Pwn2Own hack match WEBCAST: Trend Micro Deep Security with Trend Micro Watch this video of users of Trend Micro Deep Security and hear how it is ensuring regulatory compliance and preventing server, desktop and cloud data breaches. View now! Lights, camera, Big Blue: IBM going Hollywood for 100th birthday Watch out CISOs and CSOs: Chief Risk Officers may be gaining on you Apple patches 62 bugs in massive Safari update Are IT Vendors Getting A "Free Pass" On Security? WHITE PAPER: CA Minimize the Risk of Negative Business Impacts A lack of centralized visibility within the IT infrastructure means a single problem spawns multiple alarms to several teams and the underlying root cause may go undetected for too long. CA technologies enable IT to better manage quality of service and transform into a more proactive organization. Learn More Most IPv6-certified home network gear is frightfully buggy 8 essential Android security apps Flip Floppers: When Tech Execs Contradict Themselves 5 women leaders who are shaping IT | ||||||||||
GOODIES FROM THE SUBNETS SLIDESHOWS Perks drive up pay for tech CEOs First look at Google Chrome 10 MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
No comments:
Post a Comment