Monday, April 19, 2010

Tools to help you manage passwords

China reports millions of Conficker worm infections | New cloud service offers antivirus alternative

Network World Security: Identity Management

Forward this to a Friend >>>


Tools to help you manage passwords
A recent Boston Globe article ("Please do not change your password") is an in-depth look, written for the average non-techie computer user, at a study recently completed by Cormac Herley, a principal researcher for Microsoft Research. The conclusion, in a nutshell, is that so-called "strong" passwords, frequently changed, do more to infuriate users than to protect them. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: BeyondTrust

Privilege Identity Management
This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Learn More

China reports millions of Conficker worm infections
China last year hosted more than one in four of the world's computers infected with a major variant of the Conficker worm, according to an official report, highlighting the wide reach of malware inside the country. Read More

New cloud service offers antivirus alternative
Security vendor Panda Software has announced a full cloud web security service which it claims frees smaller companies from the need to filter for malware using complicated gateway boxes. New cloud security service filters web traffic Read More

Controlling RFID tags to protect privacy
A researcher is working on technology he hopes will be able to control RFID tags and protect private information. Read More


WHITE PAPER: Microsoft

Extended Security Features of Windows 7
Microsoft has added significant security enhancement to Windows 7. This Gartner research note details the capabilities available (many are only available to EA/SA subscribers), which features should be activated and where some security holes still remain. Read More.

Will "rare earth" manipulation cause a high-tech meltdown?
China controls 97% of the "rare earth" materials used to build everything from hybrid cars, lasers and radar systems to satellites, cell phones and computers - a situation that could put the United States in a perilous strategic position if not fixed. Read More

Verifying identity in customer-not-present situations
How can a Web-based business verify the identity of a person with whom it has no prior relationship? This simple SaaS solution from IDology challenges a person to answer personal questions whose answers are unlikely to be known by others. The result is a high level of confidence that the person using the Web application is precisely who he says he is. Read More

iPhone "Don't Text Me" app stops distracting, annoying text messages
Tired of your annoying friends texting you, especially while you're driving? Well, there's now a free iPhone application for that. "DON'T TEXT ME" was released today by Dr. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

BitTorrent bypass code could make downloads anonymous
The C# code that is said to evade ISP's prying eyes could cause more problems. Read More

New 'name to shame' extortion scam targets porn users
A Japanese cyber extortion gang is running a new "name to shame" scam by duping users who pirate adult games into installing malware, then demanding they pay up to keep their names from being publicly posted online, a researcher said today. Read More

New malware can take control of Macs, Intego warns
Batten down the hatches! Better yet, unplug your Mac and run for the hills! Intego, purveyor of internet security and privacy software for the Mac, reports that a new variant of malware--the intimidatingly-named HellRTS--has been spotted in the vast untamed reaches of the Internet. Read More

Senators question Cyber Command's role
The main focus of the U.S. Department of Defense's new Cyber Command will be protecting military networks, not engaging in cyberwarfare, the nominee to head the organization said Thursday. Read More

5 hot IT certification picks for 2010
Industry organizations and vendors are broadening their IT certification training catalogs to address emerging technologies and market needs. Vendor-specific (Cisco, Microsoft) and technology-specific (network, security and open source) certifications can help advance IT careers. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

10 useful Google Chrome Experiments
Google's Chrome Experiments is a Web site that showcases JavaScript programs which deliver a rich user-graphics experience. To date, there are about 80 projects featured on Chrome Experiments. Here are the 10 most useful.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. 5 hot IT certification picks for 2010
  2. Zombies are open source; humans are proprietary
  3. Apache project server hacked, passwords compromised
  4. Israel bans iPads from America
  5. Windows Phone 7 vs. iPhone: a developer's perspective
  6. Why not iSCSI?
  7. Why hasn't Linux been more successful on the desktop?
  8. 10 things the Internet has ruined and five things it hasn't
  9. 12 "White Hat" hackers you should know
  10. Mystery solved: Why time stands still at 9:42 on iPhone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment