Monday, September 20, 2010

IAM is still evolving

Researchers issue homemade patch for PDF zero-day bug | Bugs & Fixes: DNS prefetching can cause Safari problems

Network World Security: Identity Management

Forward this to a Friend >>>


IAM is still evolving
Did you know that "Identity and Access Management is undergoing a metamorphosis"? That's what Deloitte's "2010 Financial Services Global Security Study" concludes. What does that mean? Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

WHITE PAPER: NetApp

Changing the Way You Purchase Storage
Most organizations are still buying storage based on outmoded ways of thinking. Find out why it's time to modernize your approach and the key criteria you need to consider before making your next IT investment. Read now!

Researchers issue homemade patch for PDF zero-day bug
Research firm RamzAfzar this week issued a home-brewed patch that appears to fix a critical bug in the popular Adobe Reader software. Read More

Bugs & Fixes: DNS prefetching can cause Safari problems
Apple added a significant new feature to Safari in version 5.0.1. It hasn't garnered much attention and you may not have heard about it. It's called DNS prefetching, and its purpose is to speed to the loading of Web pages. Read More

Quantum computing boosted by 'photon walk' chip
Scientists led by a Bristol University team have pioneered an experimental method for quantum computers to perform calculations using photons travelling inside a silicon chip. Read More

News quiz: The week in tech
Microsoft re-enters the browser game, Twitter aims for microfame Read More


WHITE PAPER: Alcatel - Lucent

Maximize Bandwidth and Deliver Superior Performance
100G is a leap forward in scaling metro, edge and core networks without performance degradation or the cost and complexity of unnecessary network re-engineering. Alcatel-Lucent is the only supplier to offer deployable 100G solutions in both the IP and optics domains. Read Now.

AVG to help students battle Facebook status jacking
AVG has launched an online campaign to help university students combat Facebook status jacking. Read More

INTERPOL: International ID verification system needed
Law enforcement worldwide should focus on developing an international identity verification system, according to INTERPOL secretary general Ronald K. Noble. Read More

Good security tools now support Verizon Android phones
Verizon today announced that Android smartphones using its network can now run Good Technology's security and management software. Read More

How I got thrown out of an NSA party
For the National Security Agency, America's high-tech spy agency and guru for military information security, inviting the tech media to attend its first-ever NSA Trusted Computing Conference and Exposition was no easy decision. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Seven ways social nets like Facebook and LinkedIn are 'truly evil'
Social networks are a major resource for hackers trying to capture valuable corporate data or run amok inside business networks, the information security director of a major online trading firm told Security Standard attendees. Read More

Inside Intel's security organization
The "Here You Have" e-mail virus that ripped across the Internet last week didn't leave Intel unscathed: The 80,000-plus employee company had 4,400 employees click on the malware and wound up with 400 infected machines. Read More

Boeing gets $89M to build unmanned aircraft that can stay aloft for 5 years
One of the more unique unmanned aircraft took a giant step toward reality this week when the Defense Advanced Research Projects Agency (DARPA) inked an agreement with Boeing to build the SolarEagle, a plane capable of remaining at heights over 60,000ft for over five years. Read More

Google patches Chrome second time this month
Google patched 10 vulnerabilities in Chrome this week, including one pegged critical on the Mac. Read More

FTC: Springsteen fans screwed by TicketMaster Web deception get refunds
The Federal Trade Commission today said it mailed claim forms to 1,018 consumers who are eligible for refunds because they allegedly were steered from the Ticketmaster website to its ticket resale website TicketsNow while buying tickets to attend 2009 Bruce Springsteen concerts. Ticketmaster and its affiliates agreed to pay refunds to some of the concertgoers to settle FTC charges that they used... Read More

US wants big, revolutionary energy storage systems
Looking for a major new ways to harness wind, solar and other evolving renewable energy, the US Department of Energy today issued a call for advanced large-scale energy stora Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

22 Best Android Apps
Here are the top productivity tools, utilities, and games for smartphones based on Google's Android OS.

MOST-READ STORIES

  1. Did Apple swat Newsday's iPad app ad off YouTube?
  2. Seven ways social nets are 'truly evil'
  3. How I got thrown out of an NSA party
  4. Malicious code that comes with release notes?
  5. How to erase digital footprints and vanish without a trace
  6. Akamai: Why our IPv6 upgrade is harder than Google's
  7. Red Hat tops list of hottest IT security certifications
  8. Stuff I learned from my three biggest network screw ups
  9. Internet Explorer 9: A visual tour
  10. VMware, others to divvy up Novell?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment