Search This Blog

Monday, August 24, 2009

Online class helps security pros sharpen their skills

It's Microsoft vs. the professors with competing data center architectures; FCC will have tough time reining in burgeoning wireless industry
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sophos
rule

Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.

Visit this site today!

rule

Spotlight Story
Online class helps security pros sharpen their skills

To help IT security professionals sharpen their skills, InfoWorld is offering a free, 20-lesson "Security Boot Camp" online class. The class is conducted via e-mail, with students getting one assignment each workday that connects the theory of best security practices with the hands-on reality of implementing such advice. Read full story

Related News:

It's Microsoft vs. the professors with competing data center architectures
Researchers from Microsoft and the University of California at San Diego have come up with divergent schemes to address shortcomings of data center architectures, particularly management and configuration burdens, and to promote the efficient use of virtual machines.

FCC will have tough time reining in burgeoning wireless industry
With word that the Federal Communications Commission will next week begin to take a broad look at the wireless industry and how it is regulated, one wonders: What took so long?

iPhone bug affects Truphone users, fix available
Truphone, a mobile Voice over Internet Protocol (VoIP) application that routes calls across the Internet, is experiencing problems with the recent iPhone 3.0 Software Update.

Gonzalez's lawyer to contend he was not the kingpin of Heartland, Hannaford breaches
The attorney for Albert Gonzalez, the man indicted Monday on charges related to the massive data thefts at Heartland Payment Systems and four other retailers, claims it was another member of Gonzalez's gang who was the real leader of the heists.

One-in-four hackers runs Opera to ward off other criminals
Hackers using multi-exploit attack "toolkits" take defensive measures of their own against other criminals, a security researcher said today.

ConSentry Networks goes out of business
NAC pioneer ConSentry Networks is going out of business effective today, according to the company's founder.

Induc Virus Infects Popular Downloads Via Delphi
A relatively mild virus that spreads by infecting the Delphi programmer tool, and thereby infecting any program created with that tool, has been recently identified in some popular downloads.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Security Best Practices, Tools, More
You can never have enough expert advice when it comes to security. Download this Executive Guide today and discover the latest in solid security tools and strategies, emerging trends in NAC devices and data-leakage protection tools, and much more.
Click here.


Is your data center ready for virtualization?
Virtualization can deliver dramatic benefits for data centers, but it can also stress the underlying support infrastructure. Power and cooling systems—which may have been quite sufficient for pre-virtualization needs—could easily become inadequate when data center performance patterns are radically altered.
Learn More

 

August 24, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to build a 100,000-port Ethernet switch
  2. Windows 7 RC downloads end Thursday
  3. The 10 stupidest tech company blunders
  4. Apple disasters
  5. Account password reset procedures a joke
  6. Windows WINS attacks in the wild
  7. When Apple flops: The worst products of all time
  8. DNS 'blacklist' unveiled
  9. Port 666
  10. FAQ: How to get Windows 7 on the cheap

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: