Search This Blog

Wednesday, December 22, 2010

Directory services still evolving

The weirdest, wackiest and stupidest sci/tech stories of 2010 | Researchers create botnet to learn how it works

Network World Security: Identity Management

Forward this to a Friend >>>


Directory services still evolving
Just as few people understand the telephone network but billions of people use it to further their business so it might be with the directory. As long as those in a position to structure the network and design its applications know the directory's benefits, that may be enough. Read More


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

WHITE PAPER: NetApp

Changing the Way You Purchase Storage
Most organizations are still buying storage based on outmoded ways of thinking. Find out why it's time to modernize your approach and the key criteria you need to consider before making your next IT investment. Read now!

The weirdest, wackiest and stupidest sci/tech stories of 2010
From exploding Droids to robotic pack mules and Apple weirdness it was a wacky year Read More

Researchers create botnet to learn how it works
An at-scale botnet emulation helps a team of researchers in Canada and France learn more about how armies of zombie computers operate Read More

Cloud Security Alliance updates controls matrix
The Cloud Security Alliance's matrix is a controls framework that gives a detailed understanding of security concepts and principles that are aligned to the CSA's 13 domains. Read More


WEBCAST: Aruba Networks

Medical Center Shares Tips on Wi-Fi Application Assurance
In this 15-min webinar, Rutland Regional discusses how they deliver reliable voice, video and medical device communications at the point of care. WLAN at Rutland was once a nice to have serving a select group & has now transitioned to what is deemed a utility serving a diverse group of users. Learn more now!

NASA CIO wants a cool smartphone, LAN and shower cap for Christmas?
It seems that NASA CIO Linda Cureton has a pretty good sense of humor. On her NASA blog over the weekend she sent a letter to Santa about what she'd like to get for Christmas. While she'd obviously like to get better networking gear, the shower cap wish was little strange. Read More

Need A Job? Try Information Security
Many enterprise organizations need help and will be hiring in 2011If you are an out-of-work IT person looking for your next challenge, I have a suggestion: Go study information security and pursue some sort of certification like a CISSP. According to ESG Research, 22% of mid-market (i.e. 500-1000 employees) and enterprise (i.e. 1000 employees or more) believe that they have a problematic shortage of information security skills within their IT organizations. Furthermore,... Read More

WikiLeaks Triggers IT Security Angst
Security gaps could make businesses vulnerable to the same types of unauthorized disclosures plaguing the U.S. Department of State. Read More


WHITE PAPER: NeuStar, Inc.

Holiday Readiness Guide for Ecommerce
This white paper is all about Internet Gifting Essentials as it is critical that merchants ready their sites from both a performance and selling perspective. Based on the e-tailing group's Annual Mystery Shopping Survey, highlighted Internet gifting essentials were present in three-out-of-four of the 100 websites we surveyed last holiday season. Read More

Microsoft in major Security Essentials 2.0 overhaul
After a mysteriously quiet launch late last week, Microsoft has released version 2.0 of its free Security Essentials (MSE) antivirus client. Read More

Having your security conference talk rejected
Few things are as frustrating as working hard on a proposal only to be turned down Read More

Six Password Security Tips to Learn from Gawker Hack
The Germans have a word for it: Schadenfreude, taking pleasure in someone else's misfortune. And I have to admit, I did a feel a twinge of satisfaction when Gawker, one of the snarkiest and most self-satisfied collection of sites on the Web, was hacked. But I do worry about the 1.2 million people whose passwords were stolen and posted on the Web for any moderately skilled bad guy to crack and use. Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. U.S. military strong-arming IT industry on IPv6
  2. The weirdest, wackiest and stupidest sci/tech stories of 2010
  3. Photographers are not terrorists
  4. Downloads lighten your laptop
  5. Cisco eschews cloud services - for now
  6. What's beyond 10G Ethernet?
  7. Apple launches iAd Producer
  8. Take control of data you share with Digg, Twitter, Google
  9. 15 most addictive iPhone apps
  10. Microsoft yanks Office 2007 update

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: