Search This Blog

Monday, March 15, 2010

Time for spring -- and conference season

FBI details most difficult Internet scams | Cyber ShockWave Illustrates Why the Federal Government Must Lead the Cybersecurity Charge

Network World Security: Identity Management Alert

Forward this to a Friend >>>


Time for spring -- and conference season
Wow, it's March all ready. Where has the year gone? Time to start gearing up for the conference season -- which already started with the recent RSA Security conference in San Francisco and last week's Gartner Identity and Access Management Summit in London. Read More


WHITE PAPER: IBM NWW

Develop Effective user Management
With IBM, organizations can develop comprehensive solutions to help gain visibility into business continuity risks, achieve control over utilization of sensitive business assets and automate a variety of processes for managing access to critical assets and data. Read more

WHITE PAPER: Ultrium

Cost Effective Data Security with Tape
With a growing number of laws and regulations, financial penalties, and public notification costs, a security breach can be costly for corporations. Data managers are called upon to develop effective security for sensitive data and are turning to tape encryption. Read Now

FBI details most difficult Internet scams
According to the FBI and the IC3 Web site, the "popular scam trends for 2009" included hitman scams, astrological reading frauds, economic scams, job site scams, and fake pop-up ads for antivirus software. Read More

Cyber ShockWave Illustrates Why the Federal Government Must Lead the Cybersecurity Charge
Last week I wrote a blog suggesting that IT professionals and legislators read the new book, "Fatal System Error," by Joseph Menn. This recommendation was based on my believe that most people don't understand the scope of sophistication of current cyber threats and we need more government and private sector action and cooperation immediately. Read More


E-BOOK: Sybase

5 Key Mobile Management Must-Dos
Discover the five steps you can take to realize comprehensive management of your mobile environment. This IDG Playbook will guide your strategy for managing and securing your booming mobile environment, regardless of the variety of hardware and operating systems. Read More Now

Seven Firefox Plug-ins That Improve Online Privacy
Worried about preserving your privacy in an online world where privacy is disappearing? Here are seven Firefox add-ons that will help. Read More

FBI: Internet fraud losses more than doubled in 2009
The Federal Bureau of Investigation's annual wide-ranging look at Internet crime found that online crime is indeed paying off - for the criminals as it cost users $559.7 million, up from $265 million in 2008. Read More


WHITE PAPER: Force10

Data Center Optimization Strategies
Enhance the efficiency of your data center by improving power and cooling. Learn the strategies you can use to refine power efficiency, thereby boosting your TCO and lowering your budget. Read More

Cloud Security is Top of Mind
At the annual security RSA Conference, the focus was all things cloud. Forget for a moment that definitions of "cloud" are still in flux, or that aside from SaaS, the adoption rate is still in the margin-of-error range (just 2% of benchmark participants told Nemertes in 2009 they were currently deploying cloud services). Indicators point to strong enterprise interest---and this time, the security industry... Read More

Security execs express surprise over CISO's firing following RSA talk
Several security executives today expressed surprise over the firing of Pennsylvanias chief information security officer, apparently for publicly speaking about a security incident involving the Commonwealth's online driving exam scheduling system without getting the required approvals first. Read More

Biometrics: What, Where and Why
Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems. Read More

Apple plugs 16 holes in Safari as Pwn2Own looms
Apple has patched 16 bugs in the Safari browser, 12 of them critical, just two weeks before it faces off against rival technologies at the 2010 Pwn2Own hacking challenge. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. ZeuS botnet code keeps getting better
  2. 2010 tech industry graveyard
  3. Facebook pushing 'Suicide Machine' into an open-source afterlife
  4. Pennsylvania fires CISO over RSA talk
  5. FCC launches broadband test site for consumers
  6. Cisco, Microsoft certifications increase high-tech salaries
  7. Ex-Cisco engineer Randall out at Brocade
  8. Sorry to say good-bye
  9. 'Pearl Harbor' post struck a nerve
  10. Attorney sues Cisco, others for patent infringement on IPTV

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: