Search This Blog

Wednesday, February 03, 2010

User provisioning: right access to the right people

Courts move to ban juror use of Blackberry, iPhone, Twitter and Facebook | Facebook poses biggest security threat to businesses

Network World Security: Identity Management Alert

Forward this to a Friend >>>


User provisioning: right access to the right people
Last issue we touched on a new definition for identity. Today I'd like to present the definitive view of the first, both historically as well as in the context of adding identity and access management (IAM) to your organization. User provisioning has been called the "killer app" for identity management. It started us down the road to IdM over a dozen years ago. In fact, we almost take it for granted today. But what does it involve, what does it imply, and why does it matter? Read More


WHITE PAPER: WatchGuard

Avoid Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

Courts move to ban juror use of Blackberry, iPhone, Twitter and Facebook
If you think you're going to use your spanking new iPhone to entertain yourself next time you're on jury duty, think again. Judges are going to take an even dimmer view of jury member use of Blackberry, iPhone or other electronic devices as a judicial policy-setting group has told district judges they should restrict jurors from using electronic technologies to research or communicate. Read More

Facebook poses biggest security threat to businesses
Nearly two thirds (60 percent) of businesses believe social network Facebook poses the biggest threat to security, says Sophos. Read More

Windows 7 Tips: Best Security Features
Do you understand and use the new security features in Windows 7? From encryption to malware fighters, here's a look at the key Windows 7 tools that keep enterprise and home PCs safe and secure. Read More


WEBCAST: HP

Metzler: Virtualization and the Network Manager
The networks manager's role has changed significantly over the years. This Webcast highlights survey results of 460 IT pros and their experiences with network management. Learn how network automation is helping to address the unique challenges of both physical and virtual environments. Learn more

Cybersecurity needs duck-and-cover campaign to boost national awareness
Shoring up U.S. cyberdefense should include educational programs that motivate private citizens to fight cyber threats through safer Web practices, much as school children were taught in the 1950s to hide under their desks and cover their heads in case of nuclear attacks, researchers say. Read More

NASA satellite to send avalanche of hi-res Sun shots
NASA next week will launch a satellite that the space agency says will scrutinize the Sun and send back "a prodigious rush of pictures" about sunspots, solar flares and a variety of other never-before-seen astrophysical activities. Read More

10 best IT jobs right now
Today's hot IT jobs are those that can help satisfy growing demand for technologies such as virtualization, cloud, network security and social computing skills. Here we examine 10 IT jobs and the technology know-how required to land them. Read More


WEBCAST: Sybase

op 5 Best Practices for Managing Mobility
The mobile world today is similar to that of the personal computer world of the early 1980s: it is begging for IT management to ensure a productive and secure user experience. This Webcast offers practical, immediately usable best practices designed to get IT started on the road to comprehensive mobile management and security. View Now

Accusations fly over voice encryption hack
German encryption firm SecurStar has strenuously denied being behind an apparently independent test of voice encryption products that found many of its rivals could be hacked using a $100 phone-tapping program. Read More

Cloud security: Root of trust
I've been thinking a lot about public cloud security lately. Not simply mulling the theoretical question of "is cloud more or less secure than my own infrastructure", but looking at practical approaches to cloud security. At Nemertes Research we have been "sipping our own champagne" (like eating dogfood, only less disgusting) by using cloud computing extensively. For several years we used the cloud for test and development and in mid-2009 we moved production servers into the cloud. Read More

NASA has tons of cool space technologies that may never get to space
It will be a question of money over priorities. NASA is expected to release its budget for the next year and it doesn't look good for some ongoing projects – the Ares heavy lift rocket likely the biggest cut. If further manned exploration of the moon is significantly delayed or nixed altogether, what does that mean for the myriad technologies NASA already has in development? Here's a look at some of the best NASA technology currently in development that might never get to space. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

10 coolest experiments from Google Labs
When you've got thousands of the world's most brilliant engineers spending 20% of their time on whatever takes their fancy, cool software is the result.

7 social SharePoint apps built in a week
Seven startups competed to develop great SharePoint apps in one week.

MOST-READ STORIES

  1. The 10 coolest experiments from Google Labs
  2. YouTube support of IPv6 seen in dramatic traffic spike
  3. 10 best IT jobs right now
  4. Windows 7 tips: Best security features
  5. Cisco readying major core router upgrade?
  6. How many virtual machines fit on your server?
  7. Don't ever do this while at work and on live TV
  8. Fake antivirus scam hits Facebook
  9. China tablet PC maker may sue Apple over iPad design
  10. How the heck did Stephen Colbert get an iPad?

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: