Friday, September 30, 2011

The encryption quiz

Romance scams pick on divorced, lovelorn | Cisco sees new security role in the cloud

Network World Compliance

Forward this to a Friend >>>


The encryption quiz
Substitution ciphers, military encryption devices, hashing, symmetric key algorithms – how well do you know them? Read More


WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

Romance scams pick on divorced, lovelorn
Research out of the UK today says that perhaps as many as 200,00 people have been victims of online romance scams and the same study says over 1 million people personally know someone who has been scammed by one of these heartless fraudsters. Read More

Cisco sees new security role in the cloud
IT Security needs to be completely rethought in the age of cloud computing, according to Tom Gillis. Read More

NAC saves University of North Carolina money, keeps illegal file sharing in check
Network access control (NAC) is saving the University of North Carolina at Chapel Hill $40,000 per year by keeping students from illegally using peer-to-peer file-sharing applications. Read More


WEBCAST: IBM

Using IBM Tivoli Security Management for z/OS
Administration can be a complex world where security is concerned. The resources spent on administration, management, auditing and compliance can be considerable. Watch the demo, "Using IBM Tivoli Security Management for z/OS," and see how IBM® can help you protect your business—simply, efficiently and more effectively. Learn More

IT pros say social media at work is good but risky: survey
Network security pros think use of social media at work is good for business, but also creates risks they don't have the tools to address, according to a Ponemon Institute survey. Read More

Prototype "Rapid DNA" technology exhibited; could bolster forensic investigations
Using a portable kit to be able to quickly analyze human DNA collected in the field for investigative and forensics purposes has been a long-time dream for the Federal Bureau of Investigation (FBI), law enforcement and the Department of Defense (DoD). Read More

Data breach affects 4.9M active, retired military personnel
Sensitive data including Social Security Numbers, names, addresses, phone numbers and personal health data belonging to about 4.9 million active and retired U.S. military personnel may have been compromised. Read More


WHITE PAPER: BMC

Deliver Workload Automation Services to Business Users
Workload automation touches every aspect of the business. It is made up of all scheduled and ad hoc processes that support critical business functions. Read More!

Zenprise offers iPad app for secure SharePoint access
Positioned as a data loss prevention tool, the app and server software focus on enforcing SharePoint content policies on iOS devices Read More

Keeping up with PCI hasn't improved much: Verizon
Businesses aren't getting much better at meeting payment card industry (PCI) standards year-to-year, perhaps because they get cocky about passing one year and figure they will breeze through the next, according to a study by Verizon PCI and Risk Intelligence teams. Read More

Are CIOs Too Cocky About Security?
The ninth annual Global Information Security Survey conducted by CSO magazine and PricewaterhouseCoopers indicates the vast majority of tech and business execs are overconfident about their security policies. Read More

Scammers pretend to be friendly office printers
Hackers have found a new hook to trick people into opening malicious attachments: send emails that purport to come from office printers, many of which now have the ability to email scanned documents. Read More



SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. First look: Amazon Kindle Fire
  2. Will iPad soon be affordable even for cheapskates?
  3. Tablet throwdown: Amazon Kindle Fire vs. Apple iPad 2
  4. Juniper takes on Cisco, HP in 'simple' networking
  5. Samsung to pay Microsoft royalties for Android
  6. Digg scrapes Facebook for diggers' real identities & photos, change profiles
  7. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  8. Mac OS X Lion: Losing its security pride
  9. 8 piles of paper replaced by iPads
  10. Ig Nobel prizes: laugh first, think later

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment