Search This Blog

Wednesday, June 30, 2010

Group to examine cloud standards

Another Apple iPhone 4 Flaw: A Glitchy Proximity Sensor | The 10 Most Uncool Moments in Tech

Network World Security: Identity Management

Forward this to a Friend >>>


Group to examine cloud standards
Last week I had the opportunity to participate in the "Cloudchasers" series of podcasts hosted by noted raconteur Mathew T. Grant. This one included Ajay Sharma, the product marketing manager for identity management at Novell, and myself talking about "Identity and the enterprise cloud." Read More


WHITE PAPER: Radware

New Threats Require Real-Time Protection
First generation IPS devices match patterns (or "signatures") of known attack vulnerabilities to safeguard networks. However, a significant amount of threats are dynamic and not addressable by static signature-based IPS devices. Read More Now

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Another Apple iPhone 4 Flaw: A Glitchy Proximity Sensor
It happened to me on my first phone call with the new Apple iPhone 4: The display screen flashed on during the call, and I managed to inadvertently put the call onto speaker. Twice. Read More

The 10 Most Uncool Moments in Tech
That Jeff Lebowski was one cool dude. Read More

Hackers vandalise 200 web sites, cripple 150
The web sites of more than a whopping 200 Australian organisations were hijacked and vandalised in a spate of hacks last week. Read More


E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

Google steals security page from Mozilla's Firefox
Google plans to take a page from Mozilla's playbook and block outdated plug-ins from launching, part of new efforts to keep Chrome users safer. Read More

FTC says scammers stole millions, using virtual companies
The U.S. Federal Trade Commission has disrupted a long-running online scam that allowed offshore fraudsters to steal millions of dollars from U.S. consumers -- often by taking just pennies at a time. Read More

Fraudulent term papers: A breach of authenticity
Authenticity is one of the six fundamental attributes of information (the Parkerian Hexad – see "Crime, Use of Computers In" from the Encyclopedia of Information Systems) that we strive to protect through information assurance. Submitting a term paper to a teacher as fulfillment of an academic requirement when the paper has been written to order by a ghost writer is a breach of authenticity as described by Donn B. Parker in his writings (see for example Chapter 10 of Fighting Computer Crime: A New Framework for Protecting Information). Read More


E-BOOK: IBM Corporation

The IBM Guide to Smart Archive
The IBM Guide to Smart Archive is an interactive collateral and video tool that helps explain in a unique way IBM's Smart Archive strategy. Learn More

Google moves encrypted search to a new site
Google's encrypted search engine, launched in May, has moved to a new Web address that isn't as convenient as its original one but that gives organizations the option to block the site for their users without locking them out of other Google services. Read More

The pros and cons of Windows 7 security
Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-party security products might be the better fit. Read More

Social networks leak your information, study says
A study finds that shows that mobile social networks are giving data about users' physical locations to tracking sites and other social networking services. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Quiz: Do you know IT security?
  2. Super software secrets
  3. Beyond the petaflop: DARPA wants quintillion-speed computers
  4. iOS 4's hidden features
  5. Apple 4 opening day: Not all is iPhone-tastic
  6. VMware's Maritz: OSes are having their jobs stolen
  7. Report: Users find yellow discoloration on iPhone 4 screens
  8. How HTML5 will change the Web
  9. Google Voice: 10 reasons to check it out
  10. iPhone vs. Droid vs. BlackBerry

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: