Wednesday, April 14, 2010

Conformity announces SaaS solutions

Report rips key government security efforts | How to Stay Safe on Public Wi-Fi

Network World Security: Identity Management

Forward this to a Friend >>>


Conformity announces SaaS solutions
I hadn't heard much from Conformity since last year's conversation with co-founder Scott Bils, so I was glad to get a note last week letting me know that it was about to splash out with a new release. Well, three new releases, actually, but one which is germane to this newsletter. Read More


WEBCAST: Webroot

Anatomy of a Complete Security Solution
Today's malware threats use any number of guises - viruses, phishing scams, network propagation, USB infection - but their motive is usually the same. Steal sensitive information. Attend this webinar to find out how to protect your organization against today's complex malware threats. Register now!

WHITE PAPER: NetApp

Top 5 Hyper-V Best Practices
Read this whitepaper to get advice on everything from making sure you configure enough network connections, especially in iSCSI, to specifying the specific initiator groups and the correct LUN type when provisioning the NetApp LUN for use with Hyper-V. Learn More!

Report rips key government security efforts
You'd think maybe just once one of these examinations of government agency network security efforts would turn up some good news. Not today. Read More

How to Stay Safe on Public Wi-Fi
Picture this: You're at a café with your laptop and latte in hand, getting ready to review new sales leads and the quarterly financial projections. First you hop on the free Wi-Fi that the shop's management provides. Then you connect your laptop to a projector so that the entire café can take a look, and finally you hand out some printed copies of your confidential product specifications to the other patrons so that they can follow along. Read More

An inside look at intellectual property theft
Measuring the exact cost of intellectual property theft is difficult, even for the government entities assigned to measure such activities. Read More

Identity theft fears weigh on Americans
Most Americans remain afraid of identity theft, but their level of anxiety is increasing, according to a survey by Unisys. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

Microsoft to patch unhackable Windows 7 bug later today
Microsoft will play it safe by patching a Windows 7 bug that it says can't be exploited. Read More

Texas court upholds border search of laptop
The U.S. District Court for the Southern District of Texas has become the latest federal court to uphold the right of U.S. customs agents to conduct warrantless searches of laptop computers at U.S. borders. Read More

The Battle for Internet Freedom in Italy
On Sept. 8, 2006, someone posted a cell-phone video on Google Video showing four bullies punching and kicking an autistic boy in their school in Turin, Italy. Read More

Facebook to meet with UK protection agency
Facebook is to meet with the Child Exploitation and Online Protection Centre (CEOP) this week to discuss safety on the social networking site. Read More


WHITE PAPER: Cisco Systems Inc.

Improve Productivity by Optimizing your SSL VPN
Are you getting all you can from your SSL VPN? Read this whitepaper to find out Learn More

Send Secure Info Over the Internet
Michael Spector (and yes, he's my brother) asked how to safely email passwords, account numbers, and other sensitive information. Read More

Advanced persistent threat
The focus on security has shifted from network security to enterprise information protection, where the main point is simple: data is the focus for both the offense and the defense, and the cost of defense grows more quickly than the cost of offense. Read More

How security professionals monitor their kids
Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going? Read More

Extreme Networks joins RSA security alliance
Extreme Networks recently joined the RSA security partnership programme that certifies which products or services can interoperate with RSA's network security solutions. Read More

Virtualization and cloud security modeled on NAC
Virtualization and cloud computing have disrupted the security industry to its core. We have not quite figured out how to deal with very dynamic infrastructure while most security is implemented in a mostly static ring of devices surrounding the resources they protect. Read More

With Luxand Blink, Your Face Is Your Password
Luxand Blink! is a free product from Luxand, a maker of facial recognition and image editing software. What Blink! does is allow a PC equipped with a webcam to scan your face during the login process. If it matches a previously saved template, it will allow you to login by facial recognition instead of password. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Google Docs update puts more pressure on Microsoft Office
  2. Salesforce.com, VMware set to launch 'VMForce'
  3. Twitter to start pushing advertising to users
  4. Malicious Facebook ad redirected to fake antivirus software
  5. Intel to produce new Sandy Bridge chips by year-end
  6. Java founder James Gosling leaves Oracle
  7. SNIA standard should help in moving cloud data
  8. Hacker conference to address emerging Web threats
  9. Ex-Sun chief dishes dirt on Gates, Jobs
  10. Intel to ship samples of experimental 48-core processor

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment