Search This Blog

Thursday, August 19, 2010

HP's Fortify buy puts spotlight on obscure -- but important -- niche

Mozilla says a Firefox bug is no threat | Zenprise extends security controls to employee-owned iPhones, other devices

Network World Security

Forward this to a Friend >>>


HP's Fortify buy puts spotlight on obscure -- but important -- niche
HP's purchase of Fortify Software that gives it application security tools to better compete with IBM, analysts say. Read More


WHITE PAPER: NetApp

ESG Report: Driving storage efficiency in SAN environments
This ESG paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs. Read More!

WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

Mozilla says a Firefox bug is no threat
Mozilla said it will not patch a bug that blocks the display of a warning when Firefox detects a potentially deceptive URL, saying the flaw was not a threat. Read More


WHITE PAPER: Oracle

Defense-in-Depth Solutions for Security and Compliance
Learn how Oracle Database Security products are designed to work transparently, minimizing any impact on existing applications while addressing requirements found in many regulations. Oracle Database Security products provide defense-in-depth security by addressing the three layers of security: encryption & masking, access control, and monitoring. Read Now.

Zenprise extends security controls to employee-owned iPhones, other devices
Zenprise has upgraded its MobileManager software to better control access of emmployee-owned mobile devices and to purge them of corporate data. Read More


WEBCAST: Zenprise

Top Tips for Securing iPhones and iPads in the Enterprise
Attend this informative webinar to learn how you can manage, monitor and secure employee-liable iPhones and iPads in the workplace. Learn More

Facebook Warns of Clickjacking Scam
New Facebook malware tricks users into agreeing to let attackers bill their cell phone accounts. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. Five billionth device about to plug into Internet
  2. Microsoft, Google fight over e-mail, but agree on $5 inboxes
  3. The riddles and numbers in networking
  4. Google CEO: Change your name to escape our watchful eye
  5. Riverbed CEO: Cisco can have Layer 2 and 3, we'll take 4 through 7
  6. FCC: Consumers get half of advertised broadband speed
  7. EFF warns of untrustworthy SSL, undetectable surveillance
  8. Windows 8: Wish list of features and functions
  9. BlackBerry Torch fizzles: What's next for RIM?
  10. Malicious widget hacked millions of Web sites

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: