Search This Blog

Wednesday, September 30, 2009

Microsoft's security, identity integration plan dragging

Microsoft's security, identity integration plan dragging; The U.S. Patriot Act has an impact on cloud security
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Quest Software
rule

Connect with Experts at Quest Connect
Interact, learn and find answers for your identity and access management issues– without leaving your keyboard! At Quest Connect October 21-22, a world of information is at your fingertips. Access white papers, demos and webcasts as you interact with experts like Jackson Shaw. Register for this free, global virtual event.

Click to continue

rule

Spotlight Story
Novell does it again

There was a time, perhaps a dozen years ago, when Novell owned the identity management market. Of course, it's always been said of Novell that they have great technology, and abysmal marketing. They have managed to shoot themselves in the foot numerous times over the years -- and now they've done it again. Read full story

Related News:

Microsoft's security, identity integration plan dragging
Microsoft executives say the company's ambitious plan to integrate security and identity software is progressing slower than hoped but that the foundation for the work will be set early next year.

The U.S. Patriot Act has an impact on cloud security
Cloud security includes the obligation to meet regulations about where data is actually stored, something that is having unforeseen consequences for U.S. firms trying to do business in Canada.

School boards hit with cash-stealing Trojan
The U.S. Federal Bureau of Investigation is probing a rash of reported online computer intrusions that have resulted in hundreds of thousands of dollars being stolen from school districts in Illinois.

Defining Cloud Security: Six Perspectives
Cloud computing is all the rage these days, but confusion abounds over how best to secure it. Here, six IT security practitioners share their ideas on the key components of a cloud defense (part of an ongoing series).

Senators want to end telecom immunity for spying program
Four Democratic U.S. senators will introduce a bill to repeal a provision protecting telecommunications carriers from lawsuits targeting their assistance to a controversial U.S. National Security Agency surveillance program.

Google, bank end dispute over Gmail account
A federal judge in California has vacated a temporary restraining order that directed Google Inc. to deactivate a Gmail account in response to a complaint filed by the Rocky Mountain Bank of Wyoming.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 30, 2009

MOST-READ STORIES

  1. Cell towers that blend vs. those that offend
  2. Microsoft releases Security Essentials antimalware tool
  3. Fighting Conficker
  4. Pressure on Microsoft, as Windows attack now public
  5. Book of Odds opening eyes to new probabilities
  6. Cisco unveils data center blade switch
  7. John Chambers slams Cisco with $2.3 million in private jet expenses
  8. Apple pushes unnecessary software to Windows PCs
  9. Microsoft, researchers release new operating system project
  10. Port 666

Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: