Can you have too much security? | Hidden URLs in phone and tablet browsers | ||||||||||
Network World Security | ||||||||||
5 top social media security threats WHITE PAPER: Dell The Business Case for Security Information Management It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more. In this Issue
WHITE PAPER: Dell IT Managers Face Security Challenges with Mobile Devices A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more Can you have too much security? Hidden URLs in phone and tablet browsers Memory encryption breakthrough claimed by NC State researchers Key lessons learned from Sony hack-fest WHITE PAPER: F5 Networks Manageable Application Security Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more! Driving? 1 in 5 American drivers inept on the road New malware scanner finds 5% of Windows PCs infected Microsoft downplays IE 'cookiejacking' bug Cloud CIO: The Two Biggest Lies About Cloud Security WHITE PAPER: F5 Networks Secure iPhone Access to Corporate Web Applications This technical brief describes how the BIG-IP Edge Portal app for iOS devices provides simple, streamlined access to web applications that reside behind BIG-IP APM, without requiring full VPN access, to simplify login for users and provide a new layer of control for administrators. Learn More! Not even security managers immune to FakeAV infection RSA tokens may be behind major network security problems at Lockheed Martin PBS hacked by LulzSec: Lulz Boat Sailed, PBS Failed The hubris of years: IT prowess can't be measured only by time on the job | ||||||||||
SURVEY: Future-proofing the cloud GOODIES FROM THE SUBNETS SLIDESHOWS 7 things we love about Drupal 7 MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, May 31, 2011
5 top social media security threats
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment