The recent history of governments vs. the Internet | Privacy Wars: How to Hide While Google is Watching You | ||||||||||
Network World Daily News PM | ||||||||||
Senate raises H-1B fees to fund border security VIDEO: Intel Security: Everyone's Challenge Making security everybody's job is tougher than ever. You told us so, in a recent quick poll. The top concern: "Making my colleagues aware that security is now everyone's job:" 48%nearly double the other concerns. But Intel technology is making life a little easier for tech executives. Click here to see how. In this Issue
The recent history of governments vs. the Internet Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. The most recent flap is between BlackBerry maker Research in Motion and two Middle Eastern countries that want to restrict what their citizens can do with their BlackBerry devices. Here are more epic battles between governments and tech companies. Read More Privacy Wars: How to Hide While Google is Watching You WHITE PAPER: Palo Alto Networks To Block or Not. Is that the Question? There is a serious problem with today's enterprise networks the users are in control. This paper examines the difficult tradeoffs that IT departments face when determining the appropriate strategy and policies for Web 2.0/Enterprise 2.0 applications. Read now! Smartphone wave challenges enterprise security Blackberry, Windows still own the enterprise but . . . WHITE PAPER: Aerohive Replace Controllers with Protocols Learn how a controller-less approach to WLAN keeps costs linear and predictive regardless of network size or deployment type. This architecture provides the capital cost advantages of autonomous APs and the technical advantages of controller-based approaches. Learn more! News podcast: Network World 360 Most popular stories this week: Aug. 6 Leaked Photos Hint at FaceTime for iPod Touch Android 2.2: How to install Flash on Froyo | ||||||||||
Join us on LinkedIn Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today! Books for you from Microsoft Subnet and Cisco Subnet Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today! SLIDESHOWS Nine real iPad alternatives Defcon badge is unlike anything you have ever seen MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
No comments:
Post a Comment