Tighter security available to .com sites, but upgrades required | To Whom Should The CISO Report? | ||||||||||
Network World Security | ||||||||||
IBM: Mobile phone and cloud security issues can bite unwary IT departments WEBCAST: Dell Security: A Multilayered Approach The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more. In this Issue
WHITE PAPER: Dell Elements of a Proactive Data Security Solution See all the survey results along with more data security resources, including an expert Webcast outlining six vital security steps, in the security KnowledgeVault. Learn more. Tighter security available to .com sites, but upgrades required To Whom Should The CISO Report? 6 outrageous office pranks WHITE PAPER: Radware Electronic ID Provider Buypass Goes Virtual with Radware Buypass chose Radware's ADC-VX solution for its new virtualization capabilities to ensure performance predictability of its critical web applications, significant hardware savings, lower operational expenses and shorter deployment time for delivery of new applications and services to customers. Learn How Robots dive deep underwater to solve airliner crash mystery Failure to encrypt portable devices inexcusable, say analysts What a cyberwar with China might look like WHITE PAPER: Siemens The Business Value of Collaboration It would be easy to assume that if you get your hands on voice, web and video conferencing technology, you've got a business collaboration solution. But the reality is not so simple. This paper discusses the proven business value of collaboration & social media and how to make them perform. Read Now Man-in-the-Browser attacks target the enterprise Phishing attacks down dramatically in 2010, says IBM Operation Phish Phry defendants found guilty Samsung cleared of laptop keylogger accusation VIPRE maker explains false positive on Samsung laptops, apologizes | ||||||||||
GOODIES FROM THE SUBNETS SLIDESHOWS Tech's youngest billionaires No joy for would-be baby shakers and drunk drivers MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, April 01, 2011
IBM: Mobile phone and cloud security issues can bite unwary IT departments
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment