TOP STORY: Researchers reveal attack code for new IE zero-day Microsoft is investigating claims by security researchers of an unpatched bug in Internet Explorer that could be used to hijack Windows-based PCs. Read More WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest) To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now! | US to offer plethora of prize competitions to solve tough problems Bill authorizes Feds to use prize competitions to solve complicated problemsGot a complicated problem? Hold a prize competition to solve it. That's the basic idea behind the America Competes Act renewed by Congress this week. Read More Protect Your Backup Data from Murphy's Law Have you ever noticed that insurance seems to operate on the Murphy's Law principle? If you have it, you never need it, but as soon as the insurance is gone a catastrophe strikes. That is pretty much how backing up data often works. Read More WHITE PAPER: Implementing DNSSEC to mitigate financial and brand risks (F5 Networks) The problems of DNS security have long been known, which is why DNSSEC was developed. However, it is only now that widespread deployment is possible as the internet infrastructure is being readied to accept DNSSEC lookups and tools are available to remove the complexity involved in its deployment. Read now! | Energy research projects were on fire in 2010 From wind and new fuel efficient cars to biofuels and storage systems, energy research project saw million of dollars in 2010 Millions of dollars were laid out this year for all manner of energy research - from new biofuels and wind projects to better batteries and smartgrid cybersecurity programs. There were other stories too, such as the X Prize Foundation's $10 million Progressive Insurance Automotive X Prize that was finally awarded to three teams who developed super Read More Crack Your Own Passwords for Better Security Passwords are the primary key to our digital lives--providing the only barrier preventing sensitive data from being compromised in most cases. IT admins should think and act like a hacker to proactively identify weak passwords, and stay one step ahead of a data breach. Read More OpenBSD chief believes contractor tried to write backdoors The lead developer of the OpenBSD operating system says that he believes that a government contracting firm that contributed code to his project "was probably contracted to write backdoors," which would grant secret access to encrypted communications. Read More CSO resumes: 5 tips to make yours shine The current challenges in today's job market didn't stop Phillip Mahan from bouncing back quickly after a setback. Mahan was laid off from his position as manager of information security and risk management at Unisource Worldwide in February. By April he was working again as the business information security officer with ING. There is a reason why he wasn't on the job hunt for very long: He is fanatical about his resume and his career. Read More WEBCAST: Choosing Enterprise Firewall for 2011 & Beyond (Palo Alto Networks) Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more! | DDoS attacks threaten free speech, says report Harvard study finds increasing DDoS attacks against human rights, dissident sites without the means to adequately defend themselves. Read More Man used neighbor's Wi-Fi to threaten Vice President Biden A Blaine, Minnesota, man has pleaded guilty to charges that he hacked into his neighbor's Wi-Fi connection to e-mail death threats and child pornography, apparently with the intention of causing trouble for the unsuspecting neighbor. Read More Leveraging Active Directory as your single source for authentication and authorization As the role of Active Directory evolves and becomes a central component of your infrastructure, consider the following steps to improve your security posture and your ability to facilitate productive business. Read More |
No comments:
Post a Comment