Search This Blog

Tuesday, June 29, 2010

Google moves encrypted search to a new site

  Are you Using or Abusing Digital Certificates? | FTC says scammers stole millions, using virtual companies
 
  Network World Security

Forward this to a Friend >>>


Google moves encrypted search to a new site
Google's encrypted search engine, launched in May, has moved to a new Web address that isn't as convenient as its original one but that gives organizations the option to block the site for their users without locking them out of other Google services. Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

WHITE PAPER: Qualys Inc.

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Are you Using or Abusing Digital Certificates?
Read More

FTC says scammers stole millions, using virtual companies
The U.S. Federal Trade Commission has disrupted a long-running online scam that allowed offshore fraudsters to steal millions of dollars from U.S. consumers -- often by taking just pennies at a time. Read More


DOWNLOAD: Qualys Inc.

Security & Compliance Suite Trial
QualysGuard Security & Compliance Suite Trial The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Learn More!

The Federal IT Security Professional (FITSP)
The Federal IT Security Professional (FITSP) program will offer its first set of exams starting in September. The certification is broken into four individual IT security certification programs targeted at the Federal workforce based upon role: FITSP-Manager (FITSP-M) is designed for candidates who act in an oversight capacity with regard to IT security such as CISOs, ISMs, IAMs. FITSP-Designer... Read More

You Are Here: Scary New Location Privacy Risks
Location-based services on a mobile phone are terrifically helpful when you need to find a nearby business or directions to the freeway. They're also terrifically helpful to advertisers, government agencies and even stalkers who can use them to track your every move. Read More


WHITE PAPER: Radware

New Threats Require Real-Time Protection
First generation IPS devices match patterns (or "signatures") of known attack vulnerabilities to safeguard networks. However, a significant amount of threats are dynamic and not addressable by static signature-based IPS devices. Read More Now

Congress questions Apple over privacy concerns
The folks on Capitol Hill are the latest to take an interest in Apple. According to a report in the Washington Post, Representatives Ed Markey (D-Massachusetts) and Joe Barton (R-Texas), who co-chair the House's privacy caucus, have issued questions to Apple CEO Steve Jobs over Apple's policy on collecting private information. Read More

Why does my Windows Server 2008 machine register all of its IP Addresses into DNS?
Ran into this issue the other day and I figured that I would share. Basically, I was setting up a DirectAccess deployment. The customer wanted to stick the NLS instance on an existing Exchange Server 2007 CAS server. Ok… no problem. Let's add another IP address, create another Web site, and change the Web site bindings so that each site binds to a single IP address. Read More

White House cybersecurity plan needs Microsoft to work
The White House is seeking public comment on a draft plan released Friday to secure cyberspace with a trusted identities solution. Some of the early comments focus on the inherent vulnerability of Microsoft's software, although some also said end users need to be more security-conscious. Read More

Quiz: Do you know IT security?
Security is the No.1 priority for corporate networking executives, which means staying on top of the broad range of technologies used to fulfill the predominant model of network protection - defense in depth. Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more. Keep track of your score and see how well you do at the end. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

The view from the Googleplex
We recently visited the "Googleplex," Google's expansive headquarters in Mountain View, Calif., for an interview, and took the chance to snap a few pictures of life inside what must be one of the most entertaining workplaces in America.

Network access control in a nutshell
Twelve leading NAC products were put to the test. Here's what we found.

MOST-READ STORIES

  1. Quiz: Do you know IT security?
  2. Super software secrets
  3. Beyond the petaflop: DARPA wants quintillion-speed computers
  4. iOS 4's hidden features
  5. Apple 4 opening day: Not all is iPhone-tastic
  6. VMware's Maritz: OSes are having their jobs stolen
  7. Report: Users find yellow discoloration on iPhone 4 screens
  8. How HTML5 will change the Web
  9. Google Voice: 10 reasons to check it out
  10. iPhone vs. Droid vs. BlackBerry

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

202 comments:

«Oldest   ‹Older   201 – 202 of 202
Anonymous said...

carisoprodol 350 mg carisoprodol alcohol interaction - difference between soma carisoprodol

Anonymous said...

Your own ρost has cоnfіrmeԁ helρful
to myѕelf. It’s νегy usеful and
you reallу aгe obvіouѕly reаlly ωell-infoгmed οf this type.
Yоu have got popped our eye іn order tο
variоuѕ thοughts about thіѕ
κind of topic with interesting and геliablе contеnt.
Also visit my blog post :: viagra

«Oldest ‹Older   201 – 202 of 202   Newer› Newest»