Agencies struggle to meet Obama's Open Government Directive |
- Agencies struggle to meet Obama's Open Government Directive
- Sophos founders in $300 million buyout deal
- The LoveBug worm: Ten years later
- Clear gearing up to return to airports
- U.S. Treasury Web sites hacked, serving malware
- Security truths get lost in the cloud
- Will we finally learn the truth about 'Webcamgate'?
- 5 Technology Security Myths, Busted
- Microsoft fixes bug in Producer software
- An information security blueprint, part 1
- Victorian councils, libraries taught security in hack
Agencies struggle to meet Obama's Open Government Directive Posted: 04 May 2010 09:00 AM PDT |
Sophos founders in $300 million buyout deal Posted: 04 May 2010 09:00 AM PDT |
The LoveBug worm: Ten years later Posted: 04 May 2010 09:00 AM PDT |
Clear gearing up to return to airports Posted: 04 May 2010 09:00 AM PDT |
U.S. Treasury Web sites hacked, serving malware Posted: 04 May 2010 09:00 AM PDT |
Security truths get lost in the cloud Posted: 04 May 2010 09:00 AM PDT There was an awkward moment during the keynote address for The Experts Conference last week. Conrad Bayer, Microsoft's general manager for identity and access, was addressing the delegates of the Directory and Identity track and, while talking about enterprise and organization movement to cloud computing, put up a slide that compared the migration to the cloud of small, midsize and large organizations. |
Will we finally learn the truth about 'Webcamgate'? Posted: 03 May 2010 09:00 AM PDT |
5 Technology Security Myths, Busted Posted: 03 May 2010 09:00 AM PDT |
Microsoft fixes bug in Producer software Posted: 03 May 2010 09:00 AM PDT |
An information security blueprint, part 1 Posted: 03 May 2010 09:00 AM PDT The recent the Hydraq attacks were the latest example of just how radically the Internet threat landscape has changed over the past few years, and how vulnerable companies and their information stores are to cyber attacks. The attackers were not hackers, they were criminals attempting to steal intellectual property. Hydraq is an example of how cybercrime has evolved from hackers simply pursuing public notoriety to covert, well-organized attacks that leverage insidious malware and social engineering tactics to target key individuals and penetrate corporate networks. Many of today's attacks are highly sophisticated espionage campaigns attempting to silently steal confidential information. This should raise the alarm for companies of all sizes and across all industries, as information is a business' most |
Victorian councils, libraries taught security in hack Posted: 03 May 2010 09:00 AM PDT |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment