Search This Blog

Monday, December 21, 2009

Indentity management 10 years on

Drone incident serves up data encryption lesson; Slideshow: 2009 tech quiz
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Customers Share Their Experience with IBM Service Management
The IBM cloud computing infrastructure, Architecture and information management are designed to help you sustain ongoing cost reduction while improving service levels over the long term.

Learn More Now

rule

Spotlight Story
Indentity management 10 years on

Once a month we get nostalgic in the newsletter, and look back 10 years to see how far we've come. Today we'll see what the hot topics were in December 1999. Read full story

Related News:

Drone incident serves up data encryption lesson
The disclosure that Iraqi insurgents were able to intercept live video feeds from U.S. drones has focused the spotlight on a familiar IT security issue: data encryption.

Slideshow: 2009 tech quiz
As 2009 winds down it's time to look back and see how well you were paying attention as major events unfolded. Here's a quiz to help gauge your tech-news quotient.

Hackers take Twitter offline
Microblogging site Twitter went offline for a while Friday after hackers calling themselves the Iranian Cyber Army apparently managed to change DNS records, redirecting traffic to another Web page.

Raytheon BBN gets $81M to build huge network research center
Looking to be a one-stop-shop for network science research, Raytheon BBN Technologies this week was awarded an $81 million contract by the Army Research Laboratory to build what the company, which is involved in myriad network research projects for the military, called the largest communications lab in the country.

Facebook Privacy Complaint Ignites War of Words
A high-profile electronic privacy group filed a federal complaint against Facebook on Thursday -- and now, Facebook is lashing back.

The iPhone apps built for war
Raytheon today said it was working on a series of Apple iPhone and iPod Touch applications that could turn the smart devices into handy mobile battlefield tools.

Today from the Subnet communities

On Cisco Subnet:Are Cisco's acquisitions working for the company? and iACLs; A Service Providers Best Practice on your LAN; On Microsoft Subnet Microsoft Exchange 2010: A hard upgrade and not yet in the cloud: On Google Subnet: 10 best Chrome extensions

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.


Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.

 

December 21, 2009

MOST-READ STORIES

  1. The 10 best Chrome extensions for work and play
  2. Unencrypted drone video intercepted by militants
  3. Seven features in Windows 7 you probably don't know about
  4. Is Windows 7 the last major chapter in Windows story?
  5. Bank's antifraud tactics stun security expert
  6. Cisco will be hard pressed to match 2009
  7. Mixed signals from Cisco on security
  8. 10 wacky USB devices
  9. Network plans of a large Cisco customer not in Australia's best interest
  10. Will 2010 be the year of IPv6?

Data Center Survival Guide
The Juniper Data Center Survival Guide shows IT professionals how to survive in this increasingly complicated environment. It explains how to simplify your infrastructure and network management now with Juniper Networks®.
Read More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: