Samsung responds to installation of keylogger on its laptop computers | Cisco releases security, network convergence upgrades for storage switches | ||||||||||
Network World Security | ||||||||||
Samsung installs keylogger on its laptops WEBCAST: Dell Security: A Multilayered Approach The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more. In this Issue
WHITE PAPER: Dell Guidelines for Choosing a QSA The independent white paper in this security KnowledgeVault is just one of the resources to help you make the right decision. It details the top 5 questions to ask a prospective QSA firm and offers guidelines on everything from making sure they adequately handle compensating controls to assessing their expertise with virtualization. Learn more. Samsung responds to installation of keylogger on its laptop computers Cisco releases security, network convergence upgrades for storage switches FTC puts Google on 20 years of 'privacy probation' WHITE PAPER: Belden Wire Converged Solutions for Healthcare Infrastructures Healthcare management is increasingly using converged infrastructures to minimize costs. This white paper discusses the role of a converged infrastructure and how it ensures the bandwidth and signal performance for running multiple patient care applications and medical systems. Read More Hacker group defies U.S. law, defends exposing McAfee website vulnerabilities Researchers' SSL offloader costs fraction of commercial hardware Destroyed hard drives kills off UK National ID Cards WHITE PAPER: Zetta The Urgency of Recovery and Restore Data protection is challenging, but the true test is at recovery and restore. Problems may arise from not having data protection versioning or not enough RPO granularity to significant data protection errors and no automated way to catch them. This independent white paper will help you take the pain out of data protection, recovery and restore. Read More >> Microsoft researchers tout low-cost, programmable prototype data center switch Comodo hacker claims another certificate authority BP employee loses laptop containing data on 13,000 oil spill claimants | ||||||||||
GOODIES FROM THE SUBNETS SLIDESHOWS Tech's youngest billionaires No joy for would-be baby shakers and drunk drivers MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
No comments:
Post a Comment