Feds Warn of Cyber Threats, Seek Expanded Authority for DHS | Threat of a bullet in the face keeping cybercrooks conservative | ||||||||||
Network World Security | ||||||||||
Chrome 18 Arrives with Nine Security Fixes WHITE PAPER: PhoneFactor Phone Become the Leading Multi-Factor Authentication Device According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Learn More In this Issue
WHITE PAPER: NetIQ SANS Review of NetIQ Sentinel 7 A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Schenk did it, and why he feels NetIQ Sentinel 7 is a great solution for the most pressing security problems facing enterprises today. Learn More! Feds Warn of Cyber Threats, Seek Expanded Authority for DHS Threat of a bullet in the face keeping cybercrooks conservative NASA satellite spots massive, violent tornadoes in Sun's atmosphere DARPA does Big Data in a big way WHITE PAPER: Oracle Sustainable Compliance for the Payment Card Industry This white paper explains the essentials of a PCI DSS compliance program, focusing on the critical but problematic areas that comprise much of the heart of the requirements. Learn More! Uncle Sam wants to hack foreign video consoles and scrape gamers' data Researchers smash Kelihos botnet with dose of its own poison More fun with naming wireless nets News Corp: 14,000 executive emails blown open WHITE PAPER: Tripwire Security-In-Depth Using Integrated Risk-Conscious Controls Today's attacks on IT infrastructure are becoming more frequent, targeted and sophisticated. They range from well-funded, state-sponsored attacks to attacks from trusted employees and consultants. Learn More! Report cites U.S., Canada as malware attack focus Congress urged to secure drone law How Secure Is the Cloud? IT Pros Speak Up Microsoft bot takedowns help, but are no cure In praise of alternative approaches to cybersecurity | ||||||||||
SLIDESHOWS 20 iPad business apps every CIO should want JOIN THE NETWORK WORLD COMMUNITIES MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
No comments:
Post a Comment