Search This Blog

Wednesday, August 11, 2010

Courion settles into new headquarters

Network World Security: Identity Management - Newsletter - networkworld.com
The Security Industry Needs to do More Around Web Threats | NASA's head techie seeks best systems engineers of the future

Network World Security: Identity Management

Forward this to a Friend >>>


Courion settles into new headquarters
Come the end of this month and we'll be moving Mission Saint Isidore of Seville (he's the patron saint of computers and technicians. We like to spell it IsIDore…) from the San Francisco area to the Washington, D.C. area. Actually, it's a return to the D.C. area that we left in 1986 to follow a career with these new-fangled computer networks. But we aren't the only ones moving this month. Read More


WHITE PAPER: Qwest

The Three Ps of Evaluating Managed Network Services
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

WHITE PAPER: Tripwire

Cyberwar Threats: New Security Strategies for Governments
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

The Security Industry Needs to do More Around Web Threats
If you aren't familiar with web threats you should be. A web threat uses the ubiquity of the WWW as a threat vector to propagate malicious exploits and payloads. Web threats lead to infected PCs with keyboard loggers, botnet code, or traditional worms and viruses. Traditional threats like email viruses and automated Internet worms still exist, but the bad guys now find the web more more effective.... Read More

NASA's head techie seeks best systems engineers of the future
In an open letter to current and future college students, NASA Chief Technologist Dr. Robert Braun wrote this week that "Good systems engineers are not born; they are created over time." Read More

Security metric techniques: How to answer the 'so what?'
You need to be ready when the boss responds to your presentation with a "so what?" At Metricon 5, the focus is on several security metric techniques to pull it off. Read More


WHITE PAPER: Sprint

McGuire's Law of Mobility
Read what Russ McGuire, vice president of Strategy for Sprint Nextel, has to say about mobility, how it will change everything in the way people interact with the world, how it can be harnessed for competitive advantage, and more. Learn More

Registry hack allows Windows XP SP2 patching
People still running the now-retired Windows XP Service Pack 2 can trick the operating system into installing security updates, a researcher said Monday. Read More

Zeus Trojan raids 3,000 UK bank accounts
The attacks on UK online bank customers just keep coming. This time security company M86 Security has uncovered evidence that the Zeus Trojan recently broke into the accounts of around 3,000 customers at a major high street bank, stealing over $1million. Read More

How to Protect Your Smartphone's Valuable Data
So you just lost your smartphone. It isn't the end of the world, but it sure feels like it. Read More


WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Tighten Your PC's Security With Encrypt Stick
Encrypt Stick (free and $40 versions) is one of the most secure and least intrusive ways to encrypt sensitive data. It leaves no footprint on your (or others') PC, because it resides on and runs off a flash drive, and will run on both PCs and Macs. It also uses polymorphic encryption (the algorithm will change for each device it runs from) that the company claims is 10 times faster than 256-bit AES, and even provides a nifty virtual keyboard to prevent keylogging of any sort. Read More

Getting VDI right
Desktop virtualization makes it possible to centralize control and simplify management, improve security and compliance, and minimize help desk calls. It isn't perfect for all types of users within the enterprise, but when deployed appropriately, VDI can unlock new capabilities that could never be achieved through traditional physical desktop solutions. Read More

Browsers' private modes leak info, say researchers
Browsing the Web in "private mode" isn't as private as users think, a researcher said today. Read More

iPhone in the Enterprise: 5 Shortcomings
What limitations are holding the iPhone and iPad back in the enterprise? Here's Forrester's take on five key limitations that must be overcome. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Google CEO Schmidt: No anonymity is the future of the Web
  2. Investment in open source software will only go up from here
  3. Who has the better virtualization platform - VMware or Microsoft?
  4. HP researcher claims to crack compsci complexity conundrum
  5. FTC busts domain name scammers
  6. Tech's most notorious CEO scandals
  7. Is there a patch for stupid?
  8. Verizon LTE plans leaked
  9. Are new IETF switching, routing specs needed?
  10. Google-Verizon net neutrality plan raises questions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: