TOP STORY: Microsoft plans to patch critical Windows bug next week Microsoft today announced it would release just two security updates next week to patch three vulnerabilities in Windows. Read More WHITE PAPER: Long-Term Data Retention Key Considerations (Quantum Corporation) Managing backup and recovery in today's environment is a multi-dimensional challenge with both near and long-term business requirements. Recent technological developments in disk backup have had a positive impact on short-term data retention strategy. This tool provides key topics to think about as you design your long-term data retention plans. Read Now | The Impact of IPv4-Address Exhaustion on the Security of the IPv4-Only Internet When there will be no more IPv4 /8 blocks in the IANA pool, then the IPv4 dark net will be reduced to a meager 10./8. This article explains the impact on bogon filters and sinkholes.With the IPv4-address exhaustion becoming closer and closer, there could be an impact on some security techniques used by Internet Service Providers (ISP) and other security organizations. Indeed, ISPx rely on the fact that part of the IPv4 address space is not allocated in order to prevent and detect attacks with two techniques that will be described in this article. This non-allocated IPv4 address... Read More Massive ice-bound telescope set to capture elusive space particles IceCube project should shed light on neutrinos, mysterious dark matter, cosmic rays What do you get when you drill 86 holes 1.5 miles deep into the frozen ice of the South Pole, install some 5,160 light sensors and network them to a computer system above? Read More WHITE PAPER: Stop Fraudulent Transactions (ParAccel) Learn how creative, iterative analysis detects and halts fraud in minutes, rather than hours or days by leveraging: Massively Parallel Processing Columnar database for faster responses Schema-neutral, no tuning required Built-in compression and encryption Read now! | Security researcher finds way around Flash sandbox A security researcher has found a gap in the way Adobe Systems has fortified its Flash Player for better security, which could result in data being stolen and sent to a remote server. Read More The weirdest, wackiest and stupidest sci/tech stories of 2010 From exploding Droids to robotic pack mules and Apple weirdness it was a wacky year Read More WHITE PAPER: The Top 10 Reports for Managing Vulnerabilities (Qualys Inc.) This free guide covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organizations are using to reduce risks on their network infrastructure. Read now! | Study: A third of all malware in history created in 2010 More than a third of all malware that has ever existed was created by criminal gangs in 2010 alone according to the latest PandaLabs Annual Report. Read More Self-Encrypted Drives Set to Become Standard Fare We've seen this coming over time: Based on the Trusted Computing Group's standard, hard drives and solid state drives (SSD), are offering self-encryption built-in. The key difference with these next-generation encrypted drives is that these units have the encryption integrated into a single chip on drive in the drive. Read More WHITE PAPER: Tackle the Most Challenging Analytic Queries (ParAccel) Learn how a columnar-based, massively parallel processing database can provide ultra fast analytics with: Schema-neutral, load-and-go analysis High performance against complex SQL workloads All-in-memory processing Read now! | WikiLeaks fiasco prompts new Fed effort to boost data security The White House has called on all government to review processes in place to identify workers who may be inclined to disclose classified data to whistleblowers like the WikiLeaks Web site. Read More Tech That Will Matter in 2011 The road ahead reveals technology news, companies, websites, gadgets, and people that will affect your route in 2011. Read More |
No comments:
Post a Comment