Twitter encounters more digital certificate problems | Do Not Call Registry hits 200M phone numbers | ||||||||||
Network World Security | ||||||||||
What to watch at Black Hat and Defcon WHITE PAPER: Palo Alto Networks Re-Inventing Network Security Enterprise networks and applications have evolved but security infrastructure has not. Learn why application visibility and control (regardless of port, protocol, or encryption) are critical for preventing increasingly sophisticated threats that target enterprise users and data. Read now! In this Issue
WHITE PAPER: Qualys 12-point checklist outlines key considerations Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now! Twitter encounters more digital certificate problems Do Not Call Registry hits 200M phone numbers NAC decisions you need to make now E-GUIDE: Force10 Networks Inc. Examining Nuances of the Cloud Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now Black Hat may keep quiet about plans for controversial talks Black Hat: Most browsers can be made to give up personal data Founder: Black Hat reflects a changing industry WHITE PAPER: MessageLabs The Wild, Wild Web: How to Ensure 360-Degree Border Security Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now Bug reporting could be a hot topic at Black Hat A striking disconnect between CSOs and hackers Enterprise UTM vs next-generation firewalls Citi confirms critical bug in iPhone mobile banking app Immediate IT security action needed: Cisco | ||||||||||
Join us on LinkedIn Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today! Books for you from Microsoft Subnet and Cisco Subnet Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today! SLIDESHOWS Mobile deathmatch: Apple iOS 4 vs. Android 2.2 15 summer vacation ideas for geeks MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, July 28, 2010
What to watch at Black Hat and Defcon
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment