Microsoft settles VPN patent case for $200M | Planes, trucks and now trains: Texting now under Federal attack on all fronts | ||||||||||
Network World Security | ||||||||||
Google's Wi-Fi Spying: What Were They Thinking? WHITE PAPER: Adobe Close the Web 2.0 Communications Gap Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More In this Issue
WHITE PAPER: MegaPath Understanding the Value of Managed Security UTM Solutions This Yankee Group paper describes why multiple security layers are needed to achieve comprehensive and cost-effective security solutions. Learn More Microsoft settles VPN patent case for $200M Planes, trucks and now trains: Texting now under Federal attack on all fronts WHITE PAPER: Oracle Oracle Accelerate - Not Just Smart But Timely This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns PCI Compliance: Five Things You Need to Know WHITE PAPER: Riverbed Overcome Two Key Challenges with Virtualization How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here! Facebook Privacy is a Balancing Act 5 low-risk, high-reward experiments for IT Legal risks with virtual currencies in online games Facebook users warned of sexy 'Candid Camera Prank' attack | ||||||||||
Join us on LinkedIn Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today! Today from the Subnet communities 15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31. SLIDESHOWS Car hackers can kill brakes, engine, and more 20 Crazy Concept Phones MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, May 18, 2010
Google's Wi-Fi Spying: What Were They Thinking?
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment