More article whitepapers
This paper looks at the latest generation of enterprise tablets from HP, Dell and Lenovo and assesses their value enterprise proposition versus Apple's iPad.
Intel IT is proactively gathering data about Ultrabook devices and how they fit into the enterprise, in anticipation of a wave of new devices and form factors and the associated expectations who want to buy and use these devices at work.
In a competitive global market, responding to change efficiently is critical. Learn new solutions for global collaboration throughout the development lifecycle that can help effectively manage change and complexity in the development of smarter products.
The demand for smarter products continues to accelerate, requiring smarter development processes. This interactive guide introduces IBM's vision for designing, delivering, and managing smarter products.
Free Research and Reports
- The Language of UX: Beyond Buzzwords -
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- The A-to-Z of Building Your Big Data Initiative - E2 Conference Boston - E2 Conference Boston
- Evaluating Emerging Technologies for the Enterprise - E2 Conference Boston
Dark Reading Digital Magazine
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.
OpenStack devstack uses world-readable permissions for keystone.conf, which allows local users to obtain sensitive information such as the LDAP password and admin_token secret by reading the file.
Xen 4.0.x and 4.1.x incorrectly releases a grant reference when releasing a non-v1, non-transitive grant, which allows local guest administrators to cause a denial of service (host crash), obtain sensitive information, or possible have other impacts via unspecified vectors.