DARPA expands insider threat research | Microsoft's Push Back Against Spammers | ||||||||||
Network World Security Strategies | ||||||||||
Online reputation management: Manipulating search engines WHITE PAPER: CA Technologies Defend Against Insider Threats Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More In this Issue
WHITE PAPER: GFI Software Email Security in Small and Medium-sized Businesses No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now DARPA expands insider threat research Microsoft's Push Back Against Spammers Top 8 ways feds (and corporate users) can take advantage of green IT WHITE PAPER: Quest Software Protect, Restore Exchange in Virtual Environments Disaster has struck. Your virtual Exchange system is down and the pressure's on. There's only one way to successfully avoid a potential catastrophe: You need a well-documented disaster recovery plan. Discover proven techniques to prevent data loss in this Quest white paper. Learn more. Defcon: The lesson of Anonymous? Corporate security sucks Defcon: The security penetration testing quagmire Cyber-espionage attacks threaten corporate data in new unrelenting ways WHITE PAPER: Kaseya How to Launch a Successful IT Automation Initiative In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now Freedom and privacy, R.I.P. Healthcare IT Consumers Fear Data Loss From EHR Systems Former Cisco engineer indicted on hacking charges Black Hat: Apple does well but Microsoft does better with enterprise security Security rundown for week ending Aug. 5, 2011 | ||||||||||
GOODIES FROM MICROSOFT SUBNET SLIDESHOWS Chromebooks you can buy now MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, August 09, 2011
Online reputation management: Manipulating search engines
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment