Commercial enterprises are putting our critical infrastructure at risk | New generation of bank Trojans can make invisible transfers | ||||||||||
Network World Security | ||||||||||
Stuxnet cyberattack by US a 'destabilizing and dangerous' course of action, security expert Bruce Schneier says RESOURCE COMPLIMENTS OF: SolarWinds The Case for SIEM in Proactive Network Defense Whitepaper It's widely accepted that Security Information & Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis, but this technology is also key to actively defending your network. The proactive approach to network security is no longer a luxury, it's a necessity. This whitepaper explains how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide you with unprecedented network visibility, security and control. Download the free whitepaper. In this Issue
WHITE PAPER: Silver Peak Systems, Inc. Tips to Precisely Measure Packet Loss Packet loss is increasingly problematic for companies looking to lower DR costs by performing data replication over the WAN. This paper discusses the inaccuracies of measuring packet loss with ICMP (i.e. ping method) and explains how to mitigate this risk with proper packet loss measuring tools. Learn more. Commercial enterprises are putting our critical infrastructure at risk New generation of bank Trojans can make invisible transfers WHITE PAPER: Aerohive The iEverything Enterprise Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more. Apple adds emergency alert notifications with iOS 6 Some thoughts on transparency in the cloud WHITE PAPER: ADTRAN Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN) The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more. Bromium's Microvisor Technology Seeks to Solve Security Issues US wants inventive ways to get research out of university labs and into the real world Report: Flame part of US-Israeli cyberattack campaign against Iran Data in possible credit card breach appears to be old | ||||||||||
SLIDESHOWS Cool Summer Gadget Guide JOIN THE NETWORK WORLD COMMUNITIES MOST-READ STORIES
| ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, June 21, 2012
Stuxnet cyberattack by US a 'destabilizing and dangerous' course of action, security expert Bruce Schneier says
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment