| Air Force goes on cyberdefensive about attack drone virus | Did FBI tail terror suspect using Wi-Fi called 'FBI Van 1'? | ||||||||||
| Network World Security | ||||||||||
| Vint Cerf on Google's privacy practices and how getting tagged in a multitude of online media is disconcerting WHITE PAPER: Wildpackets Eliminate Packet Loss during 10G Monitoring There are a number of choices for deploying packed-based monitoring and analysis against 10G segments, but as traffic volumes grow, the limitations of many options become problematic. This EMA paper examines the issues surrounding 10G network management and monitoring with emphasis on effective packed-based instrumentation. Read More In this Issue
WHITE PAPER: ExtraHop Application Performance Management In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More! Air Force goes on cyberdefensive about attack drone virus Did FBI tail terror suspect using Wi-Fi called 'FBI Van 1'? WHITE PAPER: PhoneFactor Phones Become the Leading Multi-Factor Authentication Device According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now Mac OS X security update causes crashes, say experts Mozilla bashes Microsoft's browser security test WHITE PAPER: Certeon, Exinda & Cisco Special Digital Edition: Wan Optimization This Network World Spotlight Digital Edition, prepared by Network World editors, provides an in-depth look at the latest WAN optimization developments. Read now Lawmakers disagree on need for online privacy legislation Former HBGary Federal CEO Barr regroups after Anonymous Patch Tuesday: IE bug could spread virus; .Net affects Mac users 2011 tech industry graveyard | ||||||||||
| ||||||||||
SLIDESHOWS 26 helpful open source network management tools GOODIES FROM MICROSOFT SUBNET MOST-READ STORIES
| ||||||||||
| Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | ||||||||||
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, October 14, 2011
Vint Cerf on Google's privacy practices and how getting tagged in a multitude of online media is disconcerting
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment