Mac OS X can't properly revoke dodgy digital certificates | VMware strives to expand security partner ecosystem | ||||||||||
Network World Security | ||||||||||
US Dept. of Energy devises security system to thwart rampant copper thefts WHITE PAPER: GFI Software Social Networking and Security Risks Each social networking tool comes with its own set of security concerns which can put your information systems and/or personal data at risk. This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data. Read now! In this Issue
WHITE PAPER: Akamai Technologies, Inc. Akamai Cloud Optimization for Amazon EC2 The emergence of public cloud platforms and services has IT organizations thinking about which applications they want to keep in-house and which they can build within the cloud. Read more Mac OS X can't properly revoke dodgy digital certificates VMware strives to expand security partner ecosystem Chatbots gone wild and nasty WHITE PAPER: Fujitsu A New Look at Energy-Efficient Servers The family of PRIMERGY® Intel® Architecturebased servers offers a wide range of capacities, performance, and configurations to fit almost any application service requirements. Read now! The big, bad browser quiz Information assurance must adapt to changing technology Hackers may have stolen over 200 SSL certificates WHITE PAPER: ADTRAN Adopting Unified Communications: Key Steps to Consider The faster your business can locate, gather and share information, the more productive and competitive you can be. That's why small and medium enterprises are upgrading to a unified communications (UC) system, which can improve customer service, streamline product development and speed response to new opportunities. Learn more. >> Tips for Taming Rogue IT Hackers break into Linux source code site Agency to deliver shared governance, risk compliance service Desktop virtualization users say the technology brings challenges WikiLeaks cable: Apple slow to counter Chinese fakes | ||||||||||
SLIDESHOWS The world's geekiest license plates GOODIES FROM MICROSOFT SUBNET MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, September 02, 2011
US Dept. of Energy devises security system to thwart rampant copper thefts
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment