Monday, March 29, 2010

Identity management companies move beyond 'single-issue vending'

Microsoft defends Windows 7 security after Pwn2Own hacks | Military warns of increasingly active cyberthreat from China

Network World Security: Identity Management

Forward this to a Friend >>>


Identity management companies move beyond 'single-issue vending'
Every time I try to consign something to the "plumbing" layer, or say that it's been commoditized, my words tend to come back to bite me. It was just two months ago that I said (about user provisioning): "In fact, we almost take it for granted today." (See "User provisioning: right access to the right people".) Lately, though, there's been enough new ideas in provisioning that we really can't take it for granted. Read More


WHITE PAPER: PC Mall

Improving Disaster Recovery Solutions
Today, many companies have established a disaster recovery strategy but have not implemented a solution due to high cost estimations. This HP white paper examines how affordable data mirroring solutions can provide higher performance, high data integrity & faster and more cost-effective disaster recovery. Read More

WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

Microsoft defends Windows 7 security after Pwn2Own hacks
Just days after a pair of researchers outwitted major Windows 7 defenses to exploit Internet Explorer and Firefox, Microsoft said the measures aren't meant to "prevent every attack forever." Read More

Military warns of increasingly active cyberthreat from China
On the same day that Google Inc. and the GoDaddy Group Inc. complained about China to a congressional committee, U.S. Navy Admiral Robert Willard appeared before the U.S. House Armed Services Committee with an even stronger warning about cyber-threats posed by China. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

Browser Fingerprints: A Big Privacy Threat
Forget cookies -- even the ultrasneaky, Flash-based "super cookies." A new type of tracking may identify you far more accurately than any cookie -- and you may never know it was there. Read More

Protecting Sensitive Business Data on the iPad
The Apple iPad is coming, and--thanks primarily to the iPhone revolution--it is guaranteed to break out of its consumer-oriented shackles and start showing up at work. A quote from Star Trek: The Next Generation comes to mind: "Resistance is futile." Your business data will be assimilated. Read More


WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Phone networks try new spam abuse system
Mobile phone companies are trialling a new abuse reporting system that could make it much easier for networks to spot and block spam reported by consumers across the world. Read More

Police ask internet cafes to snoop on users
Internet café owners are being asked to snoop on online activities of its customers in a bid to combat terrorism in the UK. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Predictions on demand for iPad are astonishing
  2. New malware overwrites software updaters
  3. IPhone, Safari, IE8, Firefox all fall on day one of Pwn20wn
  4. China's Great Firewall spreads overseas
  5. Netflix Wii streaming discs to arrive in mailboxes tomorrow
  6. Software tracks employee Facebook, Twitter activity
  7. Five technologies in the mainstream, thanks to Apple
  8. Only a few days left to snag your CCNP cert training materials
  9. 20 years for notorious TJX hacker Gonzalez
  10. Researchers sound alarm on Web app 'side channel' data leaks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment