HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference | Sniffer hijacks secure traffic from unpatched iPhones | ||||||||||
Network World Security | ||||||||||
IT security's scariest acronym: BYOD, bring your own device WHITE PAPER: Dell Foundations of Security Information Management This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more. In this Issue
WHITE PAPER: Akamai Technologies, Inc. Taming the Cloud This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference Sniffer hijacks secure traffic from unpatched iPhones The IBM Selectric typewriter turns 50 WHITE PAPER: CA Technologies Ponemon: Security of Cloud Computing Providers This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More 'War texting' lets hackers unlock car doors via SMS Cloud Security: Will Your Business Data Be Safe In the Cloud? I Was Wrong About Self-Encrypting Hard Drives WHITE PAPER: CA Technologies Three steps to agile change Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now Passwords in Mac OS X can be pilfered with new tool Exploit demo on tap at Black Hat could 'make your water undrinkable' Debate rages over how to manage personal mobile devices used for work | ||||||||||
GOODIES FROM THE SUBNETS SLIDESHOWS The Geekiest iPad Apps Ever MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, July 28, 2011
IT security's scariest acronym: BYOD, bring your own device
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment