Microsoft moves to block MD5 certificates and improve RDP authentication | IBM to acquire endpoint security company Trusteer | |||||||||
Network World Security | |||||||||
Quiz: Name that hacker WHITE PAPER: Pure Storage Flash for All Servers and networks get relentlessly faster and cheaper with Moore's Law, and as a result are now thousands of times faster than the mechanical desk storage to which they connect. Download this ebook to discover how your business can improve efficiency, compete better, and deliver compelling user experiences with flash. Learn more now. In this Issue
WEBCAST: IBM Webinar: IBM IIM for Fraud, Abuse and Waste in Government View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More. Microsoft moves to block MD5 certificates and improve RDP authentication IBM to acquire endpoint security company Trusteer What are the next Big Space Life Questions? WHITE PAPER: Riverbed Technology Network Monitoring and Troubleshooting for Dummies The Network Monitoring and Troubleshooting for Dummies Book introduces you to common network performance management (NPM) issues and give you a new way of looking at solving them. This perspective allows you to see your network from your users' point of view, namely, the services and applications they use and their experience with them. Learn More Encryption news: What you need to know Cybercriminals use Google Cloud Messaging service to control malware on Android devices USENIX: Researchers propose security that adapts to combat malware that morphs WHITE PAPER: HP and Intel® Xeon® processors HP StoreOnce Is "Better Together" with HP Data Protector 7 This paper looks at the benefits to be realized in the combined scenario of HP StoreOnce appliances being used with HP's own Data Protector 7 backup software while considering the topic of "where" the deduplication occurs. Learn More Hackers targeting servers running Apache Struts applications, researchers say Cisco cuts 4,000 jobs in restructuring effort USENIX: Gamers use DDoS as a service to cheat a lot In other news: One second on the 'Net, hacker hopes to hack license plate readers, Gauss gun | |||||||||
SLIDESHOWS In our never ending effort to uncover the most useful sites for Cisco users, we've come up with 15 more! JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. 10 steps for closing the IT skills gap 2. Why Netflix is one of the most important cloud computing companies 3. Hot IT security companies to watch 4. How to solve Windows 8 crashes in less than a minute 5. Top open source network management tools 6. Chambers: Cisco will become the #1 IT company 7. 11 signs your IT project is doomed 8. How CCP handled the biggest multiplayer gaming battle in history 9. 6 highest & lowest paid IT jobs 10. Bloodiest Tech Industry Layoffs of 2013 (so far) | |||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, August 15, 2013
Quiz: Name that hacker
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment