FBI: Dirty deedsters are tweaking telephony attacks; coercion | Don't faint: Microsoft applauds hacker for Windows RT jailbreaking attempt | ||||||||||
Network World Security | ||||||||||
![]() | 12 must-watch security startups for 2013 WHITE PAPER: Raritan, Inc The Distributed Enterprise: Remote Access and IT Management For IT managers, remote offices can cause any number of headaches. Fortunately, Raritan offers solutions to help manage remote office control, security and budgetary issues. This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn more. In this Issue
WEBCAST: PhoneFactor Strong Security for Remote Workers Is Just a Phone Call Away Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More FBI: Dirty deedsters are tweaking telephony attacks; coercion Don't faint: Microsoft applauds hacker for Windows RT jailbreaking attempt McAfee provides 'vision,' but few details on Intel-specific security push WHITE PAPER: Attachmate Luminet Technical Barriers to Investigating Insider Fraud Examines the limitations of common security controls when it comes to controlling insider abuse, with special attention to the types of abuse that can occur when insiders have legitimate access to enterprise information systems. Learn More John McAfee spied on Belize Government using keyloggers Romanian sentenced to 21 months over payment card hacks Windows RT can be tweaked to run desktop apps, hacker says WEBCAST: CDW Corporation Unified Threat Management: A Better Approach to Security In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More. CES 2013: Mobility gurus acknowledge privacy concerns, but worry about the impact of legislation New laws keep employers out of worker social media accounts When it comes to VoIP and unified communications, are you sacrificing security for cost savings? | ![]() | ||||||||
| ||||||||||
SLIDESHOWS Best of CES 2013: In pictures JOIN THE NETWORK WORLD COMMUNITIES MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |

No comments:
Post a Comment