Search This Blog

Thursday, July 30, 2009

Crisis communications: A primer for teams (Part 1)

Extra '&' in Microsoft development code gave hackers IE exploit; iPhone SMS attack to be unleashed at Black Hat
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sun Microsystems
rule

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.

rule

Spotlight Story
Crisis communications: A primer for teams (Part 1)

When problems strike, organizations need clear lines of communications that have been established through careful functional analysis, documented thoroughly, tested in multiple realistic trials, and improved repeatedly to reflect reality. Read full story

Related News:

Extra '&' in Microsoft development code gave hackers IE exploit
Microsoft on Tuesday confirmed that a single superfluous character in its own development code is responsible for the bug that has let hackers exploit Internet Explorer (IE) since early July.

iPhone SMS attack to be unleashed at Black Hat
Apple has just over a day left to patch a bug in it's iPhone software that could let hackers take over the iPhone, just by sending out and SMS (Short Message Service) message.

E-mail stream spammier than ever, reports say
Spam as a percentage of all e-mail has reached an all-time high, according to two security firms releasing their periodic threat reports Wednesday.

Citrix eliminates security holes in hypervisor
Citrix's hypervisor has caught up to VMware in providing enterprise-class security features.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Meeting PCI and Securing the Data Center
Companies can achieve PCI compliance, but still suffer a major security breach. Discover how configuration assessment and file integrity monitoring get key files and configurations into a secure and compliant state and keep them there continuously, greatly bolstering security.
Click here to continue.


 

July 30, 2009

TOP STORIES | MOST DUGG STORIES

  1. Black Hat's most notorious incidents
  2. 7 half-truths about virtualization
  3. Low-tech Internet scams net big money
  4. Tweet prompts libel suit
  5. Microsoft rushes patch for 'deep' bug
  6. America's 10 most wanted botnets
  7. Broken iPhones
  8. 10 cutting edge spy gadgets
  9. Apple jettisoning Google Voice
  10. Five technologies Iran is using to censor the Web

Stopping Fraud Before it Impacts your Network
Better protect your corporate assets with a solution that integrates with existing security devices and adds comprehensive analysis including: Correlation, anomaly detection and pattern discover. Discover the benefits of using holistic reporting, visual analytics and incident response tools.
Stopping Fraud Before it Impacts your Network



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: