Review: Securing the Borderless Network: Security for the Web 2.0 World

Review: Securing the Borderless Network: Security for the Web 2.0 World


Review: Securing the Borderless Network: Security for the Web 2.0 World

Posted: 28 Apr 2010 10:00 AM PDT

Author: Tom Gillis Pages: 168 Publisher: Cisco Press ISBN: 1587058863 Introduction The future of the Web is mobile, virtualized, and collaborative. Among all the positive aspects and adva...

The US continues its reign as the king of spam

Posted: 28 Apr 2010 07:03 AM PDT

The United States continues its reign as the king of spam, relaying more than 13% of global spam, accounting for hundreds of millions of junk messages every day, according to a report by Sophos. Ho...

New malicious PDF

Posted: 28 Apr 2010 06:47 AM PDT

A new type of malicious PDF file has recently been spotted in the wild. This one contains an malicious object that was embedded into the file through the use of common the FlateDecode and ASCII85De...

Poisoned search results: Our daily reality

Posted: 28 Apr 2010 06:00 AM PDT

The biggest threat to search engines are not their competitors, but poisoned search results. Since the moment when search engines have largely become the starting point for our daily surfing, the r...

Perception of data security at odds with reality

Posted: 28 Apr 2010 05:00 AM PDT

Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data within the past two years — ...

Secure USB flash drive with on-board PIN pad

Posted: 28 Apr 2010 01:00 AM PDT

The LOK-IT is a USB flash drive with a hardware-based security system that requires users to log in on a self-contained, on-board PIN pad. The PIN pad is not connected to the host computer and the LOK...

Lansweeper 4.0: Network inventory tracking

Posted: 28 Apr 2010 12:00 AM PDT

Lansweeper 4.0 is a Windows network inventory application that will allow yo to do a complete inventory of your Windows network without the need to install an agent on all your workstations or servers...

Government-grade voice security for BlackBerry

Posted: 27 Apr 2010 11:00 PM PDT

Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile's secure cellular network and T-Mobile's Wi-Fi HotSp...

nShield Edge: USB-attached hardware security module

Posted: 27 Apr 2010 10:12 PM PDT

Thales released nShield Edge, the world's first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and requires only a standard USB connect...

0 comments:

Post a Comment