How to hack the certificate for a Cisco Identity Services Engine node | The beginning of the end of BYOD as we know it | ||||||||||
Network World Security | ||||||||||
Dell: We can beat Cisco in enterprise and cloud security WHITE PAPER: F5 Networks Solving Substantiation with SAML Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More! In this Issue
WHITE PAPER: Fiberlink Communications Achieving True Enterprise Mobility Download MDM Is Only Half the Battle from CITO Research to learn the tenets of effective Mobile Device Management (MDM) and the need for the same conversations to take place around Mobile Application Management. Learn More How to hack the certificate for a Cisco Identity Services Engine node The beginning of the end of BYOD as we know it Apple ships Java update, malware scrubber after confirming attacks on own Macs WHITE PAPER: McAfee Next Generation Network IPS This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats. Read Now Quick look: Did China's army hack US companies? Mandiant Security Report: The Chinese are coming, The Chinese are coming Insect assassin drones? Armed drones choosing targets? What could possibly go wrong? WHITE PAPER: Symantec Is Online Backup Right For Your Business? Read this whitepaper to find out how cloud-based hybrid backup offers significant cost savings, to small and medium-size businesses, as well as flexible options designed for agility, and a workforce that is free to focus on the company's core offering. Read Now! The Curse of Compliance Notification of .edu server breach mistaken for phishing email Don't get Apple picked: How to protect your Mac from theft in public places | ||||||||||
SLIDESHOWS 13 of the biggest security myths busted 13 myths about information-technology security you'll hear but should you believe? JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. Cisco declares war on Microsoft unified communications system 2. iPhone 6 rumor rollup for the week ending Feb. 15 4. Microsoft shows off iPhone, iPad and Android clients 5. Microsoft Azure overtakes Amazon's cloud in performance test 6. 13 of the biggest security myths busted 7. Did China's army hack U.S. companies? 8. Watch a Chinese military hacker launch a successful attack 9. Oxford overreacts to phishing, temporarily blocks Google Docs | ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, February 21, 2013
Dell: We can beat Cisco in enterprise and cloud security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment