How will NASA defend Earth against killer asteroids and comets? | China hacks used as lure for more targeted attacks | ||||||||||
Network World Security Alert | ||||||||||
Botnets: 'The Democratization of Espionage' WHITE PAPER: Trend Micro Securing Virtualized Data Centers - ebook The appeal of the cost savings, flexible capacity, and failover that virtualization enables is undeniable. The big question is can today's datacenter balance this increased flexibility with the need to maintain security policies and control over applications, along with the ability to prove compliance? This ebook provides the answers to critical virtualization security questions. Read Now In this Issue
WHITE PAPER: Zscaler How Hackers are Targeting Enterprise Users via Web 2.0 Browser Exploits Securing enterprise servers with firewalls and intrusion detection is critical, but the most common threats are executed on thousands of mobile end users through the Web. Lean how to protect your clients with more than desktop anti-virus/anti-spyware and HIPS. Learn more! How will NASA defend Earth against killer asteroids and comets? China hacks used as lure for more targeted attacks WHITE PAPER: St. Bernard 6 Steps to Evaluating Web Filtering Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More Web users warned about hoax Amazon emails Users on hacked site used 'trivial' passwords WHITE PAPER: Microsoft Direct Access and UAG Better Together Direct Access (DA) is a game-changing technology for remote access in your company; removing the need for a VPN all together. Within Microsoft, we've seen great productivity benefits to end users. We surveyed users from our DA pilot and over 87% saw instant productivity gains, overall resulting in net benefit of ~1 hour each day for users. Furthermore, Microsoft operations is saving costs by things such as not having to convert internet connected sites to dedicated lines. For more information on the business value of DA and Microsoft's implementation, watch the Direct Access MSIT video. Learn More Now Creating Secure Passwords You Can Remember IE attacks pose small threat to U.S., big risk to China Google's China Challenge: How It Came to This Baidu lawsuit: Register.com rep refused aid after hack | ||||||||||
New look We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading! Today from the Subnet communities New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09. SLIDESHOWS Gotta start somewhere 2010's 25 geekiest 25th anniversaries MOST-READ STORIES
| ||||||||||
Network World on Twitter? You bet we are You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy Copyright Network World, Inc., 2010 Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701 |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, January 25, 2010
Botnets: 'The Democratization of Espionage'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment