Search This Blog

Wednesday, August 18, 2010

HP to buy vulnerability specialist Fortify Software

DOJ won't file charges in school webcam spying case | GPUs: Powering Your Gaming and Cracking Your Passwords

Network World Security

Forward this to a Friend >>>


HP to buy vulnerability specialist Fortify Software
Hewlett-Packard sys it is buying Fortify Software, which makes compliance software and tools to find software vulnerabilities, for an undisclosed amount. Read More


WHITE PAPER: Cisco

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

DOJ won't file charges in school webcam spying case
Federal prosecutors say they can't find a reason to charge officials in a Pennsylvania school district for issuing student laptops that had spy-cam capabilities. Read More


WHITE PAPER: Insight

How to Reduce Overall Storage Costs By 10x
Discover how IT can better optimize its storage infrastructure, enabling administrators to deliver a cost-effective, scalable information management platform that is: * Easy to manage. * Delivers the performance and availability competitive businesses require. Read now!

GPUs: Powering Your Gaming and Cracking Your Passwords
Researchers at the Georgia Tech Research Institute have demonstrated that off-the-shelf GPUs (the same that power the video card in your PC) are better at cracking passwords than had previously been thought, according to a BBC report. Read More


WHITE PAPER: Qwest

Five Network Security Threats
Discover the five most costly network security threats and see how you can protect your business with a layered security approach. Read Now.

NSS Labs: Testing shows most AV suites fail against exploits
A majority of security software suites still fail to detect attacks on PCs even after the style of attack has been known for some time, underscoring how cybercriminals still have the upper hand. Read More

Data breach demonstrates need for access control policies
A Canadian tax collector illegally poked around in revenue databases scouting for potentail customers for her side business. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. EFF warns of untrustworthy SSL, undetectable surveillance
  2. Microsoft and Google fight over e-mail, but agree on $5 inboxes
  3. Riverbed CEO: Cisco can have Layer 2 and 3, we'll take 4 through 7
  4. Malicious widget hacked millions of Web sites
  5. Social networks leak your information, study says
  6. Five billionth device about to plug into Internet
  7. "Help, I am stranded" scam haunting social networks
  8. How to roll out full disk encryption on your PCs and laptops
  9. Friday the 13th, Part II: Oracle officially ends OpenSolaris
  10. Google Street View disasters

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: