Podcast: 5 Ways Employees can Sabotage Your Network With a poor economy and layoffs looming at a company, the most trusted employees can often turn and become an insider threat. Tim Connelly from Netcordia discusses five different ways that they can attack your network as a way for revenge or even profit (from data theft). (7:36) Microsoft, Novell partnership yields identity technology Novell Monday unveiled support for a federation protocol in its identity software that represents the first fruits of its 18-month-old interoperability lab work with... Microsoft promises integrated, identity-aware security platform In an interview with John “JG” Chirapurath, director of marketing for the Identity & Security (I&S) unit at Microsoft, he discussed Identity Lifecycle Manager 2; Forefront (Stirling); Intelligent Application Gateway SP2 and Microsoft's vision for a comprehensive, identity aware platform. Taxpayer data at IRS remains vulnerable, GAO warns Less than three months after the Treasury Inspector General for Tax Administration reported that there were major security vulnerabilities in two crucial Internal Revenue Service systems, the IRS's security practices ... De-commoditize a better mousetrap By now, you're probably well aware of the so-called "Halloween" memos. These are the two rather long documents purportedly prepared by Microsoft employees evaluating the risk factors of Linux vis-à-vis Microsoft's operating systems. Microsoft has acknowledged at least one of the memos as a valid internal document. BioPassword learns how you type to provide security management In the mid-1990s, parents were eager to find software that would protect their children from the evils of the Internet. Well, they're still looking, aren't they? But one of the major applications in use was NetNanny, which claimed (and still does) to: "Stop Porn; Limit Time Spent Online; Stop Illegal File Sharing; and Protect Personal Info" (all in capitals, of course!). Where are they now? We focused on six start-ups in our May 2007 article. Only two are still operating with the same name and the same product line. Clock ticking for gas stations to pump up data security Lower gas prices aren't the only thing that's new at the pumps these days. Data encryption tools are also becoming part of the picture. Verayo claims its RFID is unclonable When I heard that a relatively new company here in Silicon Valley was touting its product as an "unclonable" RFID chip, I was intrigued. So when Verayo's Vivek Khandelwal, director of marketing invited me to Palo Alto ... Has OpenID lost its mojo? Happy New Year to all, and I do hope it's a prosperous one for you. I expect that, in general, computer application vendors won't have a great year but those in the identity sphere - especially those who can automate necessary tasks - might do quite well. Time will tell. As the year ended, though, it appeared that OpenID (for example) was on a losing streak. Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment