Oracle patches Java flaw exploited in SSL BEAST attack Oracle has released a new Java security update to address multiple vulnerabilities, including one exploited during a recently disclosed attack that can allow eavesdropping on encrypted communications. Read More
RESOURCE COMPLIMENTS OF: Cisco Systems
Context-Aware Security for BYOD Trend Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now
WHITE PAPER: Internap
Future-Proofing Your Data Center with Scalable Density Download this complimentary white paper for a detailed exploration into how scalable density designs can extend the life of your colocation investment and improve the TCO of your colocated solutions and infrastructure. Read now
Gartner: Private clouds are a last resort Enterprises should consider public cloud services first and turn to private clouds only if the public cloud fails to meet their needs. Read More Criminals turn to 'card-trapping' at ATM machines to get cash Criminals are embracing methods to trap debit and credit cards in ATMs for retrieval later, a move believed to be motivated by better security measures designed to ensure card details are not copied at the machines, according to an industry group. Read More
WHITE PAPER: CA Technologies
The Changing Role of IT This white paper analyzes research conducted by IDG Research Services about the changing role of IT: what's driving the change, what skill-sets will be more valued and what should forward-looking IT executives consider as IT shifts increasingly towards an IT supply chain model. Learn More
NetSuite boosts global capabilities of its SaaS business software NetSuite on Wednesday announced a series of enhancements and offerings meant to make its on-demand ERP (enterprise resource planning) software more desirable to larger companies, particularly those with international operations. Read More Gartner: Big challenges lurk in building enterprise wireless networks ORLANDO - When you start off with this bit of information from Gartner: By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning - you understand the challenges enterprises face in ramping up mobile environments. Read More
WHITE PAPER: Sybase
Bloor Report: Sybase® IQ 15.3 In Detail Sybase® IQ is well positioned to compete with traditional and appliance vendors. While it has different advantages in dif¬ferent environments, it merits careful review by organisations investigating data warehousing, high-speed analytics and business intelligence options. Read now.
Researchers discover keyboard keylogger attack via iPhone A research team from the Georgia Institute of Technology says it has discovered a keyboard keylogger attack that can be done through a compromised Apple iPhone. Read More Regulators to Web startups: Prioritize privacy protection Internet companies need to build consumer privacy and data controls into their online services to protect their brands, gain trust from their users, avoid civil lawsuits and prevent government probes, according to two regulators from the U.S. and Canada. Read More |
No comments:
Post a Comment