Search This Blog

Tuesday, January 19, 2010

Ping Identity joins OpenID Foundation

UC Security Lacking | The Ominious Warnings from the Google China Incident

Network World Security: Identity Management Alert

Forward this to a Friend >>>


Ping Identity joins OpenID Foundation
There were some interesting moves in the user-centric identity space last week, which may (or may not) foretell some changes coming in the next year. Read More


SPONSOR: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

SPONSOR: Sybase

op 5 Best Practices for Managing Mobility
The mobile world today is similar to that of the personal computer world of the early 1980s: it is begging for IT management to ensure a productive and secure user experience. This Webcast offers practical, immediately usable best practices designed to get IT started on the road to comprehensive mobile management and security. View Now

UC Security Lacking
Beyond standing email security, most UC security efforts lean toward protection of VOIP, Nemertes finds. SIP protection lags far behind, and IM security is barely on the radar. Read More

The Ominious Warnings from the Google China Incident
Caught between a rock and a hard place, Google did something few companies are brave enough to do -- it went public about a data breach. This is especially noble as the company is really betting on cloud computing and SaaS for future growth. While Google applications were not breached, Google (and all cloud providers) took a PR hit with this incident. That said, Google did a good job of reassuring... Read More


SPONSOR: Unisys

The Perfect Storm for Enterprise-Class Clouds
Although Cloud computing's original appeal was to small and medium-sized businesses wanting to establish their own web-based commerce without the expenses of a data center, one of the surprising twists is in its appeal to large businesses – finding that the predominant IT delivery model has not kept pace with the rapid responses needed by business. Read Now

Conficker worm hasn't gone away, Akamai says
Variants of the Conficker worm were still active and spreading during the third quarter, accounting for much of attack traffic on the Internet, according to Akamai Technologies. Read More

Smartphone security next big thing
Future smartphones will come pre-loaded with anti-virus software clients to prevent the loss of data and services to malware. And mobile banking and person-to-person payments will be authenticated by fingerprint sensors on the handset. Read More


SPONSOR: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

Microsoft Warns of IE Zero-day Used in Google Attack
A critical zero-day flaw in Internet Explorer was exploited as part of the attack on Google and other companies, according to both Microsoft and McAfee. Read More

Smartphones targeted by porn scams
Cyber criminals have gone back to their old-school tricks to target innocent smartphone users. Read More

Cisco ASA users can't use SSL VPNs with IE 8
It may be March before Cisco's ASA security appliances support the latest version of Microsoft's Web browser, limiting what applications businesses can access over their SSL VPN connections. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: