| Symantec SSL certificates feature cryptography 10k times harder to break than RSA-bit key | Sex sites out, IT sites in for cybercrooks planting malware | ||||||||||
| Network World Security | ||||||||||
Microsoft mega-patch closes critical IE flaws, fixes 57 vulnerabilities WHITE PAPER: Dell SonicWall A New Set Of Network Security Challenges IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall such as smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. A Must Read! In this Issue
WHITE PAPER: HP, Microsoft & Intel Easing the Online Overload Many transaction processing systems have reached their capacity limits, so the time is right to consider the potential for running tier 1 mission-critical workloads on opens standards. This white paper highlights the key components of a properly structured and highly optmized SQL Server OLTP reference architecture. Read Now! Symantec SSL certificates feature cryptography 10k times harder to break than RSA-bit key Sex sites out, IT sites in for cybercrooks planting malware Obama cybersecurity order lacks bite, security experts say Bit9 hack casts spotlight on security industry practices WHITE PAPER: F5 Vital Security Strategies for Microsoft Exchange The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now. Retailers a prime target for cyber criminals in '12, says Trustwave Earth-buzzing asteroid could be worth big bucks: $195B if we could catch it UEFI secure boot fix released for Linux New FIDO Alliance pushing 'fast-identity' strong authentication protocol WHITE PAPER: Fiberlink Communications Mobile Device Management Policy Best Practices Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves. Learn More Startup Nok Nok Labs pitches strong new authentication process Mobile malware still small, but 'malnets' to rise up Hacker arrested after taunting police with clues attached to cat 12 enraging Office 2013 flaws -- and how to fix them | ||||||||||
| ||||||||||
SLIDESHOWS 12 hybrid cloud security products to watch Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. Bill Gates proves he's Bill Gates .. to Reddit's satisfaction 2. VMware's problems are deeper than just Microsoft 3. iPhone 6 rumor rollup for week ending Feb. 8 4. Feds offer $20M for critical energy network cybersecurity tools 5. Windows 8 Surface Pro sells out quickly. Was that on purpose? 6. 10 Cisco partners you should get to know 7. Cisco vs. Juniper: How different are their SDN strategies? 8. 12 hybrid cloud security products to watch 9. Google pays Apple $1bn a year to be iOS search engine default 10. Hacker arrested after taunting police with clues attached to cat | ||||||||||
| Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | ||||||||||
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, February 13, 2013
Microsoft mega-patch closes critical IE flaws, fixes 57 vulnerabilities
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment