RefBan

Referral Banners

Wednesday, June 8, 2011

Endeavour: A Look Back at 19 Years of NASA History; Lockheed Martin Network Attack Highlights Dangers of 'Cyber-Cold War'

Don't miss a single issue of eWEEK.com Government Update. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Government Update Government Update
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Storage | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - June 8, 2011
Endeavour: A Look Back at 19 Years of NASA History
Lockheed Martin Network Attack Highlights Dangers of 'Cyber-Cold War'
Northrop Grumman, L-3 Hacked via Cloned RSA SecurID Tokens
FBI Partners, Sony, Nintendo Hit by Latest LulzSec Hacks
Master iPhone Hacker Blames Buggy Code for Security Breaches
SPOTLIGHT
9 Summer Smartphones Worth the Wait
Expect to see dual-core processors, near-field communications tech, 4G connectivity and HD video streaming.
READ MORE >>
BEST OF eWEEK
Galaxy Tab Poses Major Threat to iPad
Google Wallet: Easy Mobile Payments
Android, Chromebook Questions Linger
Michael Eisner-Style Smarter Management
FEATURED VIDEO
BI Goes to Head of the Class
Colleges are now offering business intelligence and analytics courses, degrees.
WATCH NOW >>
MOST READ STORIES
Mac OS X 'Lion,' iOS 5 Converge in iCloud
Gmail Security Tips to Protect Yourself
Open-Source Winning Mainstream Status
Why iPad 3 Should Be Released This Year
IN THIS ISSUE
Endeavour: A Look Back at 19 Years of NASA History
The space shuttle Endeavour completed its final flight June 1, bringing NASA one step closer to the ultimate end of its shuttle program. Since its first flight in May 1992, a daring satellite recovery, repair and redeploy, Endeavour has flown the first space station assembly flight, flown the first Hubble Space Telescope servicing mission, and more. We bring you a look back at its storied history.
READ MORE >>

Lockheed Martin Network Attack Highlights Dangers of 'Cyber-Cold War'
News Analysis: Recent cyber-attacks against Lockheed Martin and other U.S. defense contractors show why every company needs to beef up their IT security systems to protect themselves from the expanding "cyber-cold war."
READ MORE >>

Sponsored by Symantec.cloud


Visit the new Security Solution Center on eWEEK.com for the latest IT security news, reviews, videos, and resources.
Go to the Security Solution Center
ADVERTISEMENT
Northrop Grumman, L-3 Hacked via Cloned RSA SecurID Tokens
Days after Lockheed Martin disclosed a cyber-attack on its networks, reports emerged that two more major defense contractors have also been affected.
READ MORE >>

FBI Partners, Sony, Nintendo Hit by Latest LulzSec Hacks
LulzSec, the latest group of hackers who go around compromising Websites and servers for fun, or "lolz," struck again, hitting Sony Pictures, Nintendo and two Websites belonging to FBI partners.
READ MORE >>

Master iPhone Hacker Blames Buggy Code for Security Breaches
At NATO's International Conference on Cyber Conflict, prominent iPhone hacker Charlie Miller will be giving the keynote speech about why the bad guys are winning.
READ MORE >>

Featured White Papers
How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>

Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Government Update newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Government Update, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: