Search This Blog

Tuesday, July 06, 2010

Sun, sand and some IdM tips

"Help, I am stranded!" scam haunting social networks | Cloud computing exacerbates government security issues

Network World Security: Identity Management

Forward this to a Friend >>>


Sun, sand and some IdM tips
More Americans are on vacation this week than any other week of the year but you, dear reader, are still hard at it. Your reward for working through the sweltering days of early July are some nuggets of news that you might be able to use. Read More


WEBCAST: Meraki

Take Your WiFi to the Cloud
Learn how to bring simplicity, security and scalability to your wireless network by leveraging the cloud. This Webcast demonstrates how cloud-controlled WiFi delivers: • Security • Reliability • Performance View now!

WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

"Help, I am stranded!" scam haunting social networks
The FBI and its Internet Crime Complaint Center (IC3) today said they are seeing an uptick in the complaints about online scammers trying to steal your money posing as a good friend left stranded somewhere in need of quick cash. Read More

Cloud computing exacerbates government security issues
While it is the same in many public and private corporations, government cloud computing projects can be a double-edged sword: while cloud computing offers many benefits, it can also create numerous information security risks. Read More


WHITE PAPER: Diskeeper Corporation

Reduce Disk Fragmentation by 85%
We depend upon fast data access and efficient data management but file fragmentation is a well-known barrier. HOW it is solved deeply impacts budget efficiency. This white paper details the only known maintenance practices that increase efficiency while lowering operating costs. Read Now!

Retired Stalker: Facebook Making Gen Y Stalkers Lazy
CIO.com can't reveal his name, but this 30-year veteran of stalking thinks the next generation of cyberstalkers is too spoiled. Between Facebook and Foursquare, it's no wonder, he says. Read More

What are the biggest barriers to developing wind energy?
The Department of Energy this week said it is looking for the public to help identify the most significant barriers to future wind energy development.  Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Enterprise Embrace Rich Media Development with ECDNs Click to continue

Trojan writers target UK banks with botnets
Cyber-criminals are building country-specific botnets to target UK bank consumers with dedicated malware, security company Trusteer has reported. Read More

RSA's best practices for preventing enterprise data loss
According to U.S. government estimates, incidents of enterprise data loss cost businesses more than $100 billion in a single year. As threats to enterprise data grow more sophisticated, it's imperative for businesses to implement a comprehensive data security strategy. But where to start? RSA, The Security Division of EMC, provides us with these best practices for preventing enterprise data loss. Read More

IBM buys BigFix for data centre patching
IBM is to further bulk out its profitable software division with the acquisition of privately-held patching company, BigFix. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Cisco announces business tablet
  2. Hands on with Cisco's "Cius" Android tablet
  3. Android's enterprise features on par with iPhone, not BlackBerry
  4. The pros and cons of Windows 7 security
  5. The 10 Most Uncool Moments in Tech
  6. HP draws on Avaya as a unified communications partner vs. Cisco
  7. Open source is a virus
  8. Cisco tablet not an iPad knock-off: Chambers
  9. Novell's de Icaza: 'People are scared of installing software on Windows'
  10. Wikipedia's million-dollar faux pas

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: