NSA extends label-based security to big data stores | Scammer "crams" $35 million in false phone charges -- from prison | ||||||||||
Network World Security | ||||||||||
How to Secure Your Apache Web Server WHITE PAPER: Riverbed Case Study: Boston College Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now In this Issue
WHITE PAPER: GFI Software Security Considerations for SMEs It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it. Read now! NSA extends label-based security to big data stores Scammer "crams" $35 million in false phone charges -- from prison WHITE PAPER: PhoneFactor Phones Become the Leading Multi-Factor Authentication Device According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now Hackers spied on Iranians using fake Google certificate Comodo hacker claims credit for DigiNotar attack WHITE PAPER: Entrust, Inc. A Practical Approach to Authentication Enterprise authentication used to be simple: passwords for everyone, expensive tokens for a small number who work remotely. But the workforce is now mobile and confidential data is at risk. CIOs are now challenged to increase authentication security while preserving operational and budget efficiency. Read Today! Mobile apps and security: What you need to know HP (again) shows us how not to do it Customer Leaves Apple Store with Confidential Data Microsoft: Stolen SSL certs can't be used to install malware via Windows Update | ||||||||||
SLIDESHOWS What do top CIOs make? GOODIES FROM MICROSOFT SUBNET MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, September 07, 2011
How to Secure Your Apache Web Server
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment