Biggest threat to corporate nets in 2011? Hactivists, not cybercriminals | 7 simple steps for thwarting hactivists | ||||||||||
Network World Security | ||||||||||
IBM: Internet security progress made but nasty exploits grow WHITE PAPER: BMC Optimizing Business Processes in Today's Enterprises What is workload automation, and how does it compare to traditional job scheduling? IDC tackles these questions and more in a new white paper. You'll read about: Key factors increasing IT complexity and how to manage them Building an automation strategy Definition and components of today's workload automation software Learn More In this Issue
WHITE PAPER: SonicWALL Smart Security for Escalating Challenges This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now. Biggest threat to corporate nets in 2011? Hactivists, not cybercriminals 7 simple steps for thwarting hactivists U.S. accuses AT&T of making millions off IP Relay scammers WHITE PAPER: Oracle Sustainable Compliance for the Payment Card Industry This white paper explains the essentials of a PCI DSS compliance program, focusing on the critical but problematic areas that comprise much of the heart of the requirements. Learn More! Cyber-espionage botnet tied to country of Georgia website remains a mystery Google patches 9 Chrome bugs, pays more to top researchers US ISPs commit to new cybersecurity measures WHITE PAPER: Tripwire Security-In-Depth Using Integrated Risk-Conscious Controls Today's attacks on IT infrastructure are becoming more frequent, targeted and sophisticated. They range from well-funded, state-sponsored attacks to attacks from trusted employees and consultants. Learn More! Why Hackers Set Their Sights on Small Businesses Advanced tech conflict: China's rare earth stranglehold Helpdesk outsourcing quagmire at heart of whistleblower lawsuit Most webmasters don't know how their websites got hacked, report says | ||||||||||
SLIDESHOWS Review: Android-based Wi-Fi stumblers JOIN THE NETWORK WORLD COMMUNITIES MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, March 23, 2012
IBM: Internet security progress made but nasty exploits grow
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment