Monday, July 06, 2009

IDaaS picks up steam

US sets final emergency responder wireless pilot; Bad guys learn a lesson about disaster recovery
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by BigFix
rule

It Power Management Strategies that Save
Successful power management policies deployed at enterprise scale promise numerous benefits including: Power cost savings,Environmental dividends, Rebates, Integration opportunities, Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.

rule

Spotlight Story
IDaaS picks up steam

The buzz around Identity as a Service is heating up. I'll be discussing this in an online Webinar later this month ("Externalizing Identity into the Cloud,") but there are a couple of things I want to mention today that should be of interest. Read full story

Related News:

US sets final emergency responder wireless pilot
Looking to help eliminate the dangerous and inefficient hodgepodge of communication and network technology used by emergency response personnel, the US Department of Homeland Security (DHS) today said it had picked 14 groups from across the country to pilot an ambitious Multi-Band Radio project.

Bad guys learn a lesson about disaster recovery
It didn't take long for spammers to learn their lesson. About seven months after the McColo shutdown took out their command-and-control operations, a similar shutdown last month was anticipated and routed around.

FTC opens all-out assault on economic cyber-scammers
The Federal Trade Commission today announced a wide-ranging attack on cyber-vultures looking to feast on the current moribund economic situation.

Mozilla slates first Firefox 3.5 patch
Mozilla will patch the just-released Firefox 3.5 later this month to stamp out several bugs that went unfixed in the final version of the browser, the company said.

The notification chain when a breach is suspected
A few weeks ago, we provided best practice tips on preserving log data for a forensic investigation. Now that you've got the data set aside for your investigation, who else needs to get involved? Let's discuss the notification chain and how other experts support the investigation and its fallout.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Polling Results: Leading IT Pros Weigh In on Top IT Issues
Accelerate your knowledge of the IT world you inhabit by viewing the results of a series of polls taken by your IT peers. These polls of 100+ IT professionals each are available for full viewing. They cover key topics such as virtualization, processor performance, green IT, cloud computing and many others.
Polling Results: Leading IT Pros Weigh In on Top IT Issues


 

July 06, 2009

TOP STORIES | MOST DUGG STORIES

  1. More porn sneaks onto the iPhone
  2. 'Swatting' case shows need to ban caller-ID spoofing
  3. Why the iPhone can't be "killed"
  4. Nortel enterprise chief wants to bring back Bay
  5. US sets final emergency responder wireless pilot
  6. 11 summer vacation ideas for geeks
  7. Microsoft yanks old patches; smells like FUD
  8. Cisco announces highest certification
  9. Worst U.S. cities to work in IT
  10. Could Cisco take on Microsoft with office apps?

Thinking Beyond Tape: The Case Against Tape Backup
This video whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup. When recoverability matters, depend on Double-Take Software to dynamically move, protect, and recover your critical applications.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment