Search This Blog

Monday, April 05, 2010

No one can duck Heartland fallout until it stops

Is Cisco spying on users? | US one step closer to cyber guards for nation's electric grid

Network World Security: Identity Management

Forward this to a Friend >>>


No one can duck Heartland fallout until it stops
Last week's report of JC Penney trying to keep its name out of the Heartland credit-card debacle didn't get anywhere near the attention heaped upon hacker mastermind Albert Gonzalez netting himself a 20-year prison sentence in the case, so it's definitely worth a mention here. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: Cisco Systems Inc.

The Full Story on WAAS Cost Saving Benefits
Wide Area Application Services (WAAS) can deliver a very favorable ROI within 11 months says Forrester Consulting in this informative report. WAAS lets you effectively choose how to deploy applications, store data and provision infrastructure services between branch and data center locations. Learn More

Is Cisco spying on users?
Is Cisco spying on users? A story in U.K.'s The Inquirer states that Cisco has unveiled a bandwidth usage monitoring application designed to provide insight into what type of traffic - such as video -- is using available bandwidth. Read More

US one step closer to cyber guards for nation's electric grid
The US Department of Energy this week officially opened up the bidding for a National Electric Sector Cyber Security Organization that would protect the nation's electrical grid from cyber attacks.   Read More


WHITE PAPER: Arcsight

Combating Fraud & Data Theft
Discover scalable, minimally intrusive, log-based monitoring solutions optimized to the monitoring challenges unique to financial institutions. Learn More

Ruling suggests limits on employer's access to personal e-mail
Can employers read an employee's personal e-mail composed and sent via a corporate computer, and does the employer own that e-mail? Especially if it's an e-mail to a lawyer, which raises special questions of client-attorney privilege that invoke confidentiality? Read More

Clouded views on privacy
Privacy and cloud computing have recently been in the news, with stories coming out of academia (Yale University) and government oversight agencies (Canadian Privacy Commissioner). Both, in my view, got it wrong. Read More


WHITE PAPER: Dell

Prepare for Windows 7 in Three Phases
Many organizations are skipping Vista and looking forward to Windows 7. This research provides necessary steps to prepare for Windows 7 and ensure a successful migration with adequate operating system (OS) support. Learn More Now

Cloud security: The good, bad and ugly
While vendors work to address enterprise concerns about cloud computing security, experts warn there's no easy fix. Meanwhile, cloud service outages and criminals operating in the cloud threaten enterprise acceptance of the utility computing model. Read More

DHS studying global response to Conficker botnet
One year after the Conficker botnet was front-page news around the world, the U.S. Department of Homeland Security is preparing a report looking at the worldwide effort to keep it in check. Read More

Tokenization eases merchant PCI compliance
Today, it's expected that merchants accept electronic payments and that those payments are secure with no data leaks or breaches of any kind. But the reality is many merchants don't truly understand the vulnerabilities that electronic payments present. They may think they are secure when in fact they are at risk. Read More

Interesting Data about Data Breaches
In a recent ESG Research survey, we asked security professionals at enterprise organizations (i.e. 1,000 employees or more) whether their organization had suffered a data breach within the last year. Here are the results: Yes, several incidents: 11% Yes, one incident: 23% No: 63% Don't know: 3% My analysis: 1. In total 34% of these... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Google cracks animal translation riddle ... for Android
  2. Google's April Fools hoaxes in 2010
  3. How Google wants to change telecom
  4. Verizon gets the iPhone!
  5. 10 funny April Fools' pranks
  6. Will the iPad live up to the hype?
  7. Silicon cockroaches, 'dirty' IPv4 addresses, other Internet oddities
  8. Endpoint security gets complicated
  9. The oddest places to find Linux
  10. Hotel chain starts using child porn detection

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: