Watch a Chinese military hacker launch a successful attack | 13 of the biggest security myths busted | ||||||||||
Network World Security | ||||||||||
Quick look: Did China's army hack US companies? WHITE PAPER: F5 Networks Solving Substantiation with SAML Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More! In this Issue
WHITE PAPER: McAfee Next Generation Network IPS This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats. Read Now Watch a Chinese military hacker launch a successful attack 13 of the biggest security myths busted Oxford University briefly blocks Google Docs in anti-phishing effort WHITE PAPER: Symantec Is Online Backup Right For Your Business? Read this whitepaper to find out how cloud-based hybrid backup offers significant cost savings, to small and medium-size businesses, as well as flexible options designed for agility, and a workforce that is free to focus on the company's core offering. Read Now! Apple victim of malware attack Mozilla changes policy to limit risk of subordinate CA certificate abuse Twitter calls for smarter password habits following Jeep, Burger King hacks WHITE PAPER: Fiberlink Communications Achieving True Enterprise Mobility Download MDM Is Only Half the Battle from CITO Research to learn the tenets of effective Mobile Device Management (MDM) and the need for the same conversations to take place around Mobile Application Management. Learn More Kaspersky apologizes for antivirus update that continues to disrupt customer nets Critical infrastructure protection: Maybe thinking good thoughts will make us safe Meet Mandiant, the company pulling the covers off alleged Chinese hackers Startup spins up identity and access-control cloud service Drones still face major communications challenges getting onto US airspace | ||||||||||
SLIDESHOWS 13 of the biggest security myths busted 13 myths about information-technology security you'll hear but should you believe? JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. 13 of the biggest security myths busted 2. New report says cyberspying group linked to China's army 3. Google retail stores could be a smart move, analysts say 4. How BlackBerry recreated the mobile user experience with Z10 5. Microsoft's Outlook.com comes out of preview phase 6. Career advice that will change your life 7. Galaxy S IV design reportedly finalized, along with pint-sized variant 8. Source code to original Adobe PhotoShop released 9. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T fact sheet 10. Flip side to Burger King Twitter hack: Many new followers | ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, February 20, 2013
Quick look: Did Chinas army hack US companies?
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment