Researchers discover credential-stealing Unix-based server botnet | While we celebrate Sunshine Week, U.S. is named Enemy of the Internet. Thanks NSA! | |||||||||
Network World Security | |||||||||
Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes WHITE PAPER: Fortinet Key Security Considerations for the Data Center Your Data Center firewall security will soon need to support throughput over 100Gbps. John Grady, in an IDC Analyst Connection answers key questions regarding protecting the heart of the Enterprise. Learn more >> In this Issue
WHITE PAPER: Fortinet Who does NSS Labs "Recommend" for NGFW? In 2012, NSS Labs found that most available NGFW solutions "fell short in performance and security effectiveness." In 2013 NSS Labs noted "marked improvement" and bestowed their "recommended" rating on 6 vendors. Click here to find out who they were. Learn more >> Researchers discover credential-stealing Unix-based server botnet While we celebrate Sunshine Week, U.S. is named Enemy of the Internet. Thanks NSA! "We need more scientific mavericks" WHITE PAPER: IBM Pay-as-you-Grow Data Protection IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now Spam in the fridge may soon have second meaning Google Graveyard: Here's what Google has killed so far in 2014 Healthcare.gov: Proceed at your own risk WEBCAST: CDW Next Generation SAM Managing software assets and licenses is a time-consuming job that can drain IT resources. When this is not done properly, a company might spend more on licenses than needed and could put the company at risk, exposing it to fines and other penalties. View Now Microsoft scrambles to simplify its licensing 12 hot security start-ups you need to know Cisco's 10 most opportunistic acquisitions | |||||||||
SLIDESHOWS 12 hot cloud computing startups to watch: Product photo gallery Cloud management, development, security and more. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. 10 (FREE!) Microsoft tools to make admins happier 2. 'Nobel Prize in Computing' goes to distributed computing wrangler Leslie Lamport 3. The great 'iPhone 5c is a failure' freakout 4. My most-wanted software feature: rollbacks 5. Cisco's 10 most opportunistic acquisitions 6. 12 hot security start-ups you need to know 7. 20 infamous hacker security vendor break-ins 8. Microsoft's Lync surging as PBX choice in North America 9. Big data, big pay: 10 data jobs with climbing salaries 10. Nine Hadoop companies you should know | |||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, March 20, 2014
Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment