Search This Blog

Friday, September 17, 2010

10 steps to easier access management; How I got thrown out of an NSA party

How I got thrown out of an NSA party | VoIP and compliance regulations make strange and difficult bedfellows

Network World Compliance

Forward this to a Friend >>>


10 steps to easier access management
NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week. Read More


WHITE PAPER: Citrix Systems

Gartner: Magic Quadrant for Application Delivery Controllers
Citrix Positioned in the Leaders Quadrant for 2009 Application Delivery Controllers Magic Quadrant, Gartner Group Read now!

In this Issue


WHITE PAPER: Iron Mountain

Online Backup and Recovery
IT professionals are increasingly looking to online backup and recovery services for server data protection. This White Paper helps companies recognize the major categories of service providers offering online backup and recovery specifically for servers. Read Now

How I got thrown out of an NSA party
For the National Security Agency, America's high-tech spy agency and guru for military information security, inviting the tech media to attend its first-ever NSA Trusted Computing Conference and Exposition was no easy decision. Read More

VoIP and compliance regulations make strange and difficult bedfellows
As attacks against VoIP persist businesses not only have to defend themselves, they have to do it under the gun of regulators who want proof that security was addressed in accordance with their ever-changing rules. Read More

Are colleges and universities at greater risk of data breaches?
Database security vendor AppSec says colleges and universities need to do more to secure their databases against break-ins Read More

Red Hat tops list of hottest IT security certifications
Interest in IT security certifications is booming, as more U.S. companies tighten up the protection surrounding their critical network infrastructure and as a growing number of employees view security expertise as recession proof. Read More

Is your cell phone a router?
While the current generation of "smartphones" is emerging with amazing capabilities, many of these capabilities can also lead to serious security implications. Let's take as an example of this capability the emergence of the feature available on phones like the Droid X to use your cell phone as a router. Read More


WHITE PAPER: Zoho Corporation

A Service Desk That Transformed Cetero Research
Alex Walker, Director of IT at Cetero Research had a problem, and it was right out his office window. Alex could see his technicians dashing between buildings, clutching a PC like a football, rushing to the next break-fix. "I was being controlled by the end user," he says. Read More

Can privacy be saved? Maybe
At the CSO Security Standard Tuesday, General Electric's senior counselor explained what GE is doing to protect customer, employee and supplier privacy. Read More

Do security regulations hinder business?
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment. Read More

How physical, IT security sides can work together
A physical security specialist teams up with an IT security specialist to outline a more potent defense. From the CSO Security Standard event in New York. Read More

Vulnerability management basics: Tools of the trade
In part two of our series on vulnerability management basics, we look at the variety of scanners and other tools crucial to the task. Read More

Good security tools now support Verizon Android phones
Verizon today announced that Android smartphones using its network can now run Good Technology's security and management software. Read More


WHITE PAPER: Emerson Network Power

Avocent MergePoint® Infrastructure Explorer
Need real-time insight so you can simply plan and manage your data center? Learn how Data Domain used Avocent MergePoint Infrastructure Explorer software to find underutilized racks and saved $400K in space, power and cooling in one quarter. Read Now.

Forrester: Trust no one when it comes to IT security
Forrester Research is releasing a report titled "Introducing the Zero-Trust Model of Information Network" in conjunction with its Security Forum event in Boston this week. Read More

Seven ways social nets like Facebook and LinkedIn are 'truly evil'
Social networks are a major resource for hackers trying to capture valuable corporate data or run amok inside business networks, the information security director of a major online trading firm told Security Standard attendees. Read More

PwC lauds Trusted Platform Module for strong authentication
ORLAND - Auditing and business-services firm PricewaterhouseCoopers (PwC) today said it's built its next-generation authentication system by swapping out employees' older software-based private-key certificates for hardware-based storage of new certificates using the Trusted Platform Module (TPM). Read More

Are colleges and universities at greater risk of data breaches?
Database security vendor AppSec says colleges and universities need to do more to secure their databases against break-ins Read More

NSA product accreditations lag behind IT security advances
The National Security Agency wants to use commercially-built security products and the latest virtualization software. But the slow pace of getting products certified through NSA channels and the lightening fast pace of change in the IT industry is causing national-security heartburn. Read More

Mozilla halts Firefox security updates
Mozilla has temporarily stopped providing security updates to its Firefox browser as engineers investigate a bug that has caused some computers to crash. Read More

Microsoft patches Windows XP flaw that aided Stuxnet worm
Microsoft Tuesday patched a critical Windows XP vulnerability that aided attacks based on the Stuxnet worm by letting attackers gain remote access through the operating system's print spooler service. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

22 Best Android Apps
Here are the top productivity tools, utilities, and games for smartphones based on Google's Android OS.

MOST-READ STORIES

  1. How to erase digital footprints and vanish without a trace
  2. Will Microsoft Internet Explorer 9 finally kill IE6?
  3. Who's buying Novell? Place your bets
  4. New Avaya device takes on Cisco (Apple, too) in tablet war
  5. Linus Torvalds becomes an American citizen
  6. Red Hat tops list of hottest IT security certifications
  7. Tablet wars: Avaya Flare vs. Cisco Cius
  8. Google Android overtakes Windows Mobile
  9. Forrester: Trust no one when it comes to IT security
  10. HTC unveils two Desire smartphone models

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: