| Microsoft to patch Windows bug called 'Holy Grail' by one researcher | What's up with these solar storms? | ||||||||||
| Network World Security | ||||||||||
| 10 scariest hacks from Black Hat and Defcon RESOURCE COMPLIMENTS OF: Cisco Do You Need to Lock It Down or Free It Up? With companies moving towards the cloud, trends in BYOD, and stricter policy enforcement requirements, every CIO needs more transparent and efficient networks. Christopher Young, SVP of Cisco's Security and Government Group, reveals how context awareness and security enablement empower businesses to embrace the global workforce and mitigate risk. Watch the keynote In this Issue
WHITE PAPER: NetIQ Security Information and Event Management eGuide Security threats these days are increasingly focused on critical components of enterprise infrastructures the servers, databases, and directories that store and manage crucial corporate information. Learn More! Microsoft to patch Windows bug called 'Holy Grail' by one researcher What's up with these solar storms? WHITE PAPER: PhoneFactor Phone Become the Leading Multi-Factor Authentication Device According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Learn More Final Thoughts on the RSA Conference 2012 Lockheed: Prototype Space Fence tracking orbital debris WHITE PAPER: GFI Software GFI VIPRE Antivirus Business 5.0 This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More IETF explores new working group on identity management in the cloud New key technology simplifies data encryption in the cloud Anonymous defaces police equipment supplier site, releases Symantec code Joint ventures by US tech firms with China pose cyberwar risk: report | ||||||||||
| ||||||||||
SLIDESHOWS Inside Apple's iPad world-wide ubiquity CISCO SUBNET MOST-READ STORIES
| ||||||||||
| Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | ||||||||||
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, March 12, 2012
10 scariest hacks from Black Hat and Defcon
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment