Search This Blog

Thursday, August 25, 2011

NIST proposes National Initiative for Cybersecurity Education

MIT researchers craft defense against wireless man-in-middle attacks | Apache warns Web server admins of DoS attack tool

Network World Security Strategies

Forward this to a Friend >>>


NIST proposes National Initiative for Cybersecurity Education
The National Institute of Standards and Technology is taking comments on a proposed initiative to improve general knowledge about computer security in an effort to improve national security. Read More


WHITE PAPER: Fujitsu

New TPC-E Benchmark Results Revealed
A "glue-less" design, where no additional hardware is necessary to run all eight CPUs and all memory slots enable the shortest route between processors, memory modules and I/O hubs inside a single chassis. It's just one of the many reasons Fujitsu servers are leading the way in TCP-E benchmarks and overall price/performance. Read now!

WHITE PAPER: GFI Software

Email Security in Small and Medium-sized Businesses
No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now

MIT researchers craft defense against wireless man-in-middle attacks
A new technique crafted by MIT researches can detect the tampering by man-in-the-middle attackers in wireless networks, making it possible to nip such attacks in the bud. Read More

Apache warns Web server admins of DoS attack tool
Developers of the Apache open-source project warn users of the popular Web server software about a denial-of-service (DoS) tool that exploits a bug in the program. Read More


WHITE PAPER: Seeburger

Increasing Supply Chain Efficiency: A cloud-oriented focus
A solution called "community cloud" offers advantages such as: -Flexible, scalable compute capacity -A highly secure, consistent services layer managed by a third party in the cloud -The cost benefits of moving IT from a capital expenditure to an operating expense. Read now

Windows XP on TSA laptops? TSA Dinged in Wireless Cybersecurity Audit
Auditors say the Transportation Security Administration has security problems of its own: bad patch management and configuration controls on Windows XP laptops. Read More

Technology Review's annual 35 Innovators Under 35: Uncrashable software, secure cloud computing among areas of expertise
MIT's always interesting Technology Review 35 Innovators Under 35 list is out, including an Australian researcher who came up with an uncrashable operating system that's resilient to cyber attacks. Read More


WHITE PAPER: ADTRAN

Unified Communications: Getting the Green Light
In these articles, Network World and its sister IDG Enterprise publications explore the rising importance of UC within the enterprise and provide advice on how to create a working strategy. Learn more

Security needs to get vertical
Security needs of individual industries are diverging, making one-size-fits-all security products less attractive than ones that are customized for specific verticals. Read More

India exempts outsourcers from new privacy rules
Corporations that outsource the collection of personal data to firms in India won't be subject to new Indian rules that could have created compliance nightmares for foreign businesses that hire those firms. Read More

Experts positive on Facebook's new privacy controls
Privacy advocates and security experts have given Facebook a preliminary thumbs-up on the upcoming changes designed to improve privacy controls on its site. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The world's geekiest license plates
  2. Future TSA: Track All 'Daily Travels To Work, Grocery Stores & Social Events'
  3. 21 Chrome Web Apps for Serious Work
  4. Why You Shouldn't Buy a Discounted TouchPad Tablet
  5. iPhone thief accidentally IDs himself via Photobucket
  6. Before the iPhone: The kings of mobile
  7. Top 10 made-in-China iPhone apps
  8. Aging East Coast infrastructure a concern after quake
  9. Tablets becoming popular bathroom activity, survey finds
  10. Palo Alto earns short list status

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: