Wednesday, April 21, 2010

Layer7 announces cloud suite

Is Network Security a Dead End Career? | Data loss prevention comes of age

Network World Security: Identity Management

Forward this to a Friend >>>


Layer7 announces cloud suite
When you're hoping to spend a day at the beach, a break in the clouds is a good thing. But if you've tied your business to platform-as-a-service (PaaS), software-as-a-service (SaaS), or identity-as-a-service (IaaS) then a break in those clouds could spell disaster. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

Is Network Security a Dead End Career?
Hard to believe that I ever thought I would be sitting here wondering about the state of security as a viable career path. I have built my career up as a security dude/hacker for years, but lately I have been noticing a few things. - Vendors are getting really good at detecting network anomalies and the interfaces are getting easier and easier to program. - Threat vectors have become so large that... Read More

Data loss prevention comes of age
After testing endpoint and perimeter data loss prevention products, we conclude our series with a look at DLP tools that can do both. Read More

DLP primer
Data Leak Protection products (DLP) are designed to help organizations keep tabs on and protect sensitive data that, if lost, could create legal liability, loss of profit, safety or security risks, and so on. Read More


WHITE PAPER: Dell

A Smart Path To Virtualization
As server virtualization continues to transform the data center, enterprises have some critical decisions to make. How will they migrate to a fully virtualized environment? Dell is partnering with other industry leaders to build a flexible, industry-standard approach that helps simplify the transition. Learn More

Interop 2010
Like the RSA Security conference in March, Interop will likely offer non-stop hyperbole about all things related to cloud computing. Nevertheless, I expect a lot of additional and very useful dialogue around the following topics: Read More

Hot spot dangers
Security experts say that employees are increasingly exposing personal and professional information unknowingly as they log in at Wi-Fi hot spots. Although these breaches haven't yet made big headlines, given corporate America's increasing reliance on smartphones, laptops and other portable devices, it's only a matter of time, experts say. Read More

Future of SF admin Terry Childs now in jury's hands
Terry Childs' battle to avoid being convicted over what his supporters characterize as a workplace dispute gone wrong is almost over. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

Symantec unveils beta versions of 2011 security software
Symantec has made beta versions of its Norton Antivirus 2011 and Norton Internet Security available to web users. Read More

Cambridge team in quantum crypto breakthrough
The rarefied field of encryption Quantum Key Distribution (QKD) has edged another step closer to real-world use. Read More

Gov't regulators call on Google to respect users' privacy
Ten government regulators responsible for protecting the private information of their countries' citizens have sent an open letter to Google calling on the company to respect national laws on privacy. Read More

Report: Google attack targeted 'Gaia' password system
The information stolen from Google in cyberattacks late last year included a password system that gives users access to multiple services after just one login, according to a news report. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Why computer science students cheat
  2. Gizmodo names Apple coder who lost "iPhone 4G"
  3. Network Solutions sites hacked again
  4. Your BlackBerry's dirty little security secret
  5. Left 4 Dead 2's first DLC due next week
  6. Poor AT&T coverage reported at Coachella music festival
  7. Storage smackdown: Hard drives vs. SSDs
  8. 5 hot IT certification picks for 2010
  9. Vendors prep for 40/100G, more data center virtualization
  10. HP boasts "Cisco free" data center with 3Com portfolio

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment