Monday, August 01, 2011

How to survive Black Hat and Defcon without getting hacked -- maybe

Researchers praise Facebook for paying bug bounties | A mind-blowing look at today's mind-controlled, mind-reading technologies

Network World Security

Forward this to a Friend >>>


How to survive Black Hat and Defcon without getting hacked -- maybe
Among the thousands of security experts at the Black Hat, Defcon and Security BSides conferences next week in Las Vegas, some will surely test whether they can break into nearby laptops, phones, networks -- even RFID-enabled room keys and credit cards. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

WHITE PAPER: Splunk

Autodesk Gains Visibility into MSP Metrics with Splunk
See how Splunk has become the tool that is allowing Autodesk to crack the MSP "black box" and measure critical metrics and SLA performance. Read more.

Researchers praise Facebook for paying bug bounties
Facebook's move today to follow Google, Mozilla and Hewlett-Packard in offering bounties for bugs got a unanimous thumbs up from security researchers. Read More

A mind-blowing look at today's mind-controlled, mind-reading technologies
It sounds like the stuff of science fiction, but for the past few years, researchers have tapped into brain waves to control everything from video games to wheelchairs. They are beginning to use computers to decipher our thoughts, too. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Doing e-Discovery / Message Retention / Legal Recovery in Exchange 2010 - Office 365
The topic has come up many times recently on how organizations can leverage Microsoft Exchange 2010 (on-premise) or Microsoft Office 365 (in the cloud) to retain messages, legally hold and recover messages, and successfully perform eDiscovery tasks as required by legal counsel, by law, and/or as needed. This document clarifies what's included "in the box" in Exchange 2010 and Office 365, and... Read More

Google explains its data correlation privacy settings
In response to my blog post about how Google seems to be gathering pubic data about people and correlating it with their Google user names, Google has offered some explanations. A company spokesperson told me that the search giant is not looking at public phone directories to match phone numbers with user names. But it is looking through social media sites to correlate those accounts to your Google... Read More


WHITE PAPER: F5

Load Balancing 101: Firewall Sandwiches
How to make a ''firewall sandwich''. Read now. Learn More!

US phisher who hit 38,500 gets long prison sentence
A California man was sentenced to 12 years and seven months in prison Thursday for his role as the brains behind a widespread phishing scam that took in more than 38,000 victims. Read More

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment