Search This Blog

Monday, October 18, 2010

Oracle takes MQ lead for user provisioning

RSA: Security requirements must be defined when outsourcing | Chinese anti-satellite space junk count hits 3,000

Network World Security: Identity Management

Forward this to a Friend >>>


Oracle takes MQ lead for user provisioning
It's October, so it must be time for IdM-based Magic Quadrants to appear. Everyone looks to the report as a guide to winners and losers -- most especially the vendors whose products are in the category being discussed. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

RSA: Security requirements must be defined when outsourcing
One of the common pitfalls of outsourcing software development is not clearly defining and communicating the business's security requirements to the supplier, a panel of security experts have warned. Read More

Chinese anti-satellite space junk count hits 3,000
NASA says space debris from the Chinese the Fengyun-1C spacecraft anti-satellite test poses distict hazards to other satellitesThree years after the Chinese government blew one of its satellites in space with a missile the debris from that explosion continues to grow.  Read More

DHS scoured social media sites during Obama inauguration for 'items of interest'
A rights advocacy group is expressing concern over what it contends was an overly broad surveillance of social networking sites conducted by the U.S. Department of Homeland Security in the days leading up to last years presidential inauguration. Read More


WHITE PAPER: HP & Intel

Understanding the HP BladeSystem Matrix Technology
Discover how Matrix integrates proven technologies to provide a complete platform upon which services can be readily provisioned and adjusted to meet changing business demands. Learn More Today!

A quarter of WiFi networks unsecured, finds survey
Years after WiFi security was supposed to have gone 'critical', a quarter of access points in the UK remain open and unsecured, a new 'wardriving' survey has discovered. Read More

Cloud computing security skeptics abound
The prospect of data security in cloud computing — particularly public-cloud computing — has security professionals taking a cautious approach. Read More

Half of home Wi-Fi networks vulnerable to hacking
Nearly half of all home Wi-Fi networks could be hacked within five seconds, says CPP. Read More


WHITE PAPER: Iron Mountain

The Critical Need for Archiving
This paper will provide an introduction to the key areas involved in developing an e-discovery strategy and to help organizations become better prepared for the rigors of the e-discovery process. Read Now.

Spam nation: U.S. tops list of spam-relaying countries
Spam nation. Let's face it, that's what they should call us, and it's not the eatin' spam, it's the e-mail spam. The United States of America is the top spam-belching nation in the entire world — by far. Read More

Encryption for the Internet and for telephony
In 1991, Zimmerman released Pretty Good Privacy (PGP) and made it available, including source code, by FTP, thus allowing virtually anyone with an Internet connection to download it. At that time, PGP (based on the RSA algorithm) was the first freely available public-key based encryption program. Read More

Focus on ZeuS Malware Clears the Way for Other Threats
The ZeuS "crimeware toolkit" has made recent headlines lately by garnering attention of the FBI, and for the new components that allow hackers to break into BlackBerry and Symbian phones. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Seven secret weapons for network management on a budget
I am constantly looking for new open source tools that can make my life easier or allow me to assess client network environments. Here are some of my favorites, including a few lesser-known treasures.

The first Windows Phone 7 smartphones
Dell, HTC, LG and Samsung all unveiled smartphones running the Windows Phone 7 OS. In the United States, the GSM phones will be available on AT&T and T-Mobile beginning in November. (CDMA phones, such as the HTC 7 Pro on Sprint, will be available in first half of 2011.) Here's a first look at the new phones. Has Microsoft been successful with its mobile overhaul?

MOST-READ STORIES

  1. Cisco's top 10 rivals
  2. Tech hiring up almost 50% since 2009, Dice says
  3. Gang uses Facebook to rob houses
  4. Kitchen tech: From ingenious to absurd
  5. IMDb turning 20 on Sunday
  6. Human error gave spammers keys to Microsoft systems
  7. What will Android 3.0 look like?
  8. All hail the open-source time machine!
  9. Microsoft Wiffler lets smartphones use free Wi-Fi from moving vehicles
  10. Cloud computing security skeptics abound

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: