NASA Inspector General doubts space agency can hit mandatory computer encryption goals | FTC hits up 9 data brokers for info on how they collect and use private data | ||||||||||
Network World Security | ||||||||||
15 (FREE!) security tools you should try RESOURCE COMPLIMENTS OF: Sourcefire Your Company Has Just Been Attacked by Malware Now What? Sophisticated malware attacks can take any organization by surprise. Silver bullet solutions don't work. Sourcefire's Advanced Malware Survival Kit gives you a better way to defend against and respond to today's advanced malware attacks before, during and after the threat. Download our Incident Response Brief: 4 keys to effective malware defense/response strategies. In this Issue
WEBCAST: HP Storage in the Cloud Cloud will impact your storage environment. Hear what a HP Storage expert has to say. View Now! NASA Inspector General doubts space agency can hit mandatory computer encryption goals FTC hits up 9 data brokers for info on how they collect and use private data WHITE PAPER: HP Extend the Life of Your Storage Leveraging deduplication in backup environments yields significant advantages. The cost savings in reducing disk capacity requirements change the economics of disk-based backup. Read Now! Executive Management Are Becoming More Engaged In Information Security WHITE PAPER: Quest Software The Right Way to Prove Identity and Establish Trust Right now, someone's logging into your network and accessing proprietary data. Do you know who it is? Ensuring the identity of the person(s) trying to access your network is harder than ever. This Quest technical brief explains why two-factor authentication is superior to password authentication. Read Now! Android botnet abuses people's phones for SMS spam 10 technologies that disappointed in 2012 5 tips to retain great security talent With blue-chip backing, joint venture firm looks to embed crypto technology in mobile devices, electronic payments | ||||||||||
SLIDESHOWS 10 technologies that disappointed in 2012 JOIN THE NETWORK WORLD COMMUNITIES MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, December 19, 2012
15 (FREE!) security tools you should try
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment