Search This Blog

Monday, August 23, 2010

LDAP misconceptions live on

  SOPHOSticated advice about safe Web browsing | Researcher told Microsoft of Windows apps zero-day bugs 6 months ago
 
  Network World Security: Identity Management

Forward this to a Friend >>>


LDAP misconceptions live on
It's that time of the month when we pause and reflect on what we were talking about in this newsletter (and in the IdM community in general) 10 years ago -- in this case, August 2000. Read More


WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

WHITE PAPER: HP

SMB: Data protection strategy for remote offices
Learn how midsize businesses or enterprises with regional data centers or remote offices can effectively address data protection challenges by implementing solutions that help store and protect business critical data, cut costs and improve efficiency and reliability. Read Now

SOPHOSticated advice about safe Web browsing
How do we convince busy colleagues to pay attention to security? Read More

Researcher told Microsoft of Windows apps zero-day bugs 6 months ago
Microsoft has known since at least February that dozens of Windows applications harbor bugs that hackers can exploit to seize control of computers, an academic researcher said. Read More

McAfee inside: How Intel bid could shake up IT security
Intel has pledged that its proposed $7.68 billion McAfee buyout will result in more secure networked devices through an integration of software and hardware that will challenge offerings from other big security vendors and perhaps change the way in which security is delivered to enterprise IT shops. Read More


WHITE PAPER: HP

ESG: Business Value of Reservationless Storage Capacity
This report explores the value of some exciting new storage technologies which are collectively known as "reservationless storage." ESG Lab hands-on testing of the HP StorageWorks product line and analysis are used to quantify the business value of reservationless storage. Read Now

Tool takes aim at ad attacks
WASHINGTON, DC --Web advertisements are one of the more pesky ways malicious hackers have been using to steal all manner of private information or deliver other sorts of malware. One of the worst examples of this activity was last year's New York Times.com attack ad. Read More

Google CEO: Young web users will need to escape online posts
Young web users may be need to change their names when they become adults in a bid to distance themselves from content previously posted online about them, says Google. Read More

Three sentenced in scam targeting tech vendors
Three people were sentenced to prison terms Thursday for their roles in a multimillion-dollar scheme targeting payments to IT and consulting services vendors from four state governments, the U.S. Department of Justice said. Read More


WHITE PAPER: HP

Standalone Data Reduction Technologies
Data reduction technologies provide reliable and highly scalable storage solutions - with proven management and ease use that enable higher capacity utilization with less budget, time and energy. Learn about these technologies and how HP solutions can improve storage capacity utilization. Read Now

Cameron Diaz tops malware bait list
Actress Cameron Diaz leads the McAfee list of celebrities who are most dangerous to Web searchers. Read More

Facebook Places could spark new privacy fire
With its new location-based Places feature, Facebook may have just lit the match that will ignite another round of privacy controversy. Read More

Panel drafts privacy recommendations for health data exchanges
A "tiger team" that advises the federally charted Health IT Policy Committee will submit a list of recommendations on Thursday for ensuring the privacy and security of personally identifiable health information in Health Data Exchanges. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: