Wednesday, April 28, 2010

Invest in federated identity management now

Toshiba laptop encryption drive aims at upgraders | UK hunts for new cyber security experts

Network World Security: Identity Management

Forward this to a Friend >>>


Invest in federated identity management now
Now truly is the time for organizations to invest in federated identity management. Not surprising to hear that from me, but it's actually a paraphrase of a statement by Tom Smedinghoff, partner at Chicago law firm Wildman Harrold, in an interview with Government Information Security News. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WEBCAST: Actuate

Solve Data Needs: BIRT Defined
This webcast will give you a primer on BIRT including the technology and the community. BIRT can help you overcome the challenge of delivering accurate and meaningful data to users while minimizing IT development efforts. Learn more today!

Toshiba laptop encryption drive aims at upgraders
Toshiba is going after laptop users looking to retrofit a full disk encryption (FDE) drive to their portables, announcing the new Enigma SED drive. Read More


WHITE PAPER: BeyondTrust

Privilege Identity Management
This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Learn More

UK hunts for new cyber security experts
A new scheme in the UK is hoping to find the next wave of British computer security experts in a bid to tackle cyber crime. Read More


WHITE PAPER: Websense

Essential Information Protection
Successful organizations depend upon their ability to collaborate, communicate, and share information online. This paper explains how Essential Information Protection is designed to help organizations make the most of their IT security investments. Read More

Businesses 'vastly overconfident' on security
Businesses remain very overconfident about security, according to an extensive study on their practices. Read More

Social Networking Exposes Business Networks to Risk
Once upon a time, instant messaging was a consumer technology. That consumer toy worked its way into the corporate network and was eventually not just accepted, but embraced and leveraged as a valuable tool. Social networking is on that same path, but still has some security growing pains to go through on the way. Read More

Cereal hacker on defacement rampage
The websites of Kellogg's, Nutri-Grain, Vogel's and Specialty Cereals were hit in a string of mass defacements on Sunday. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

Confessions of tech hoarders
How much hardware do you have hidden in your home's nooks and crannies? One tech hoarder shares pictures of his stash, as well as those of some readers.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Corporate IT just won't let IE6 die
  2. Breaking down the BlackBerry Pearl 3G, Bold 9650
  3. 40G Ethernet takes center stage at Interop
  4. Wi-Fi 11n competition heats up
  5. Standby for your shot at Halo: Reach pre-beta codes
  6. RIM unveils its first 3G BlackBerry Pearl
  7. Spy tools: What private investigators use to sleuth
  8. Cisco finally releases 64-bit IPSec client
  9. 15 future-laptop concepts: The fascinating and the far-fetched
  10. Conficker found on 25% of enterprise Windows PCs

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment