Search This Blog

Monday, July 12, 2010

Turning point for LDAP

  Researchers tout new weapon in Internet censorship arms race | US R&D: 27 Million Workers; $11 trillion in sales
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Turning point for LDAP
I left you with a bit of a cliffhanger in the last issue ("Future of directories in question"), which got at least one reader champing at the bit to find out what was yet to come. We'll get to that shortly, but first I must apologize for a dreadful typo that crept in (note to self: do NOT rely on spellchecker!). Vikas Mahajan is really my friend, not "my fiend"! Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: IBM

The Information Agenda Guide for Financial Markets
CIOs need relevant information to achieve both short-term and long-term strategic goals. Read this guide to find out how an IBM Information Agenda can help financial institutions address a wide variety of business tasks, as well as unlock the value of their information, by using it in entirely new ways. Read Now

Researchers tout new weapon in Internet censorship arms race
Trying to get out in front of what they call a censorship arms race, a team of researchers has come up with technology that lets users exchange messages through heavily censored networks in countries such as China and North Korea in hidden cha Read More

US R&D: 27 Million Workers; $11 trillion in sales
US companies that performed or funded research and development domestically or in their overseas locations--employed 27.1 million workers worldwide in 2008, according to a new National Science Foundation report. The Read More

Military wants Holy Grail of secure encryption technology
It's a data encryption technology that protects sensitive data but at the same time lets computations be performed on it all without the data being decrypted. Read More


WHITE PAPER: IBM

Drive Business Innovation with IBM Analytics Solutions
Business leaders today are making decisions with major blind spots. But with advanced analytics, you can become a smarter, more fact-based enterprise. Read this white paper to see how IBM Analytics Solutions can help you gain a competitive advantage by enabling real-time or near-real-time decisions. Read Now

Poor SSL set-up can kill e-commerce
Online merchants are shooting themselves in the foot with faulty SSL deployments that trigger alarms scaring customers away before they have the chance to complete transactions. Read More

Gaming giant Blizzard ends online anonymity, stirs up storm
Activision Blizzard stirred up a lively debate on privacy issues this week by announcing plans to require that posters to its gaming forums use their real names. Read More

Four critical US cybersecurity projects that need constant pressure
When it comes to our nation's information systems and cyber infrastructures, the hackers never stop trying to smash it and the government should never stop trying to protect it. Read More


WHITE PAPER: IBM

Work Smarter with IBM Smart Analytics System
Working smarter means being able to optimize and grow your business. The IBM Smart Analytics System is a ready-to-use analytics solution that turns information into insights and accelerates decision-making across your business. Read the white paper and put your business in the best position to quickly adapt and grow in any environment. Read More

NSA 'Perfect Citizen' Program is Only One Piece of the Cyber Security Puzzle
It is the job of the National Security Agency (NSA) to protect US national security systems, which includes the critical infrastructure--whether public or private sector--that forms the backbone of national defense and commerce for the country. The NSA "Perfect Citizen" initiative is only one step, though, in a larger cyber security process that must involve private sector information security professionals to be effective. Read More

Google downplays claim it may have breached lawmakers' home networks
A consumer group has charged that vehicles gathering data and images for Google's Street View feature may have inadvertently breached wireless networks at the homes of federal lawmakers. Read More

Cisco Live 2010 attendee list hacked
Someone hacked the list of attendees for the recent Cisco Live 2010 users' conference, a security breach that led Cisco to notify the customers as well as a broader group who have dealings with the company. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Military wants Holy Grail of secure encryption technology
  2. Cisco warns attendees that the Cisco Live database was hacked
  3. The best Windows 7 downloads
  4. Cisco Live 2010 attendees list hacked
  5. Cisco considers IOS for cert self study
  6. iPad invades corporate America
  7. Hackers edge toward unlocking iPhone 4 OS and network
  8. Movie 'Despicable Me' finds hero in behind-the-scenes technology
  9. VMware: no 'timeline' for release of delay-ridden hypervisor
  10. Poor SSL set-up can kill e-commerce

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: