Search This Blog

Monday, December 20, 2010

What does 2011 hold for identity management?

iSnitching & Foursquare door hacking. What could possibly go wrong? | Remains of the day: Crime doesn't pay

Network World Security: Identity Management

Forward this to a Friend >>>


What does 2011 hold for identity management?
Today we'll take one more look at some predictions for identity management and identity and access management (IAM) in the coming year. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: IBM

Ask the Oracle 8 Ball
Do you know how much more WebLogic Server Enterprise Edition now costs? Who is the real leader on performance benchmarks? How will the recent acquisition of Sun affect you? Is Oracle inhibiting your ability to cost effectively develop and manage your critical business workloads? Ask the "Oracle 8-Ball" for the answers. Read More

iSnitching & Foursquare door hacking. What could possibly go wrong?
A couple of new products jumped out at me this week, an iPhone app to help citizens become iSnitches and a Foursquare hack that can unlock your front door. Oh boy, no potential for abuse there. What could possibly go wrong with either of these? Read More

Remains of the day: Crime doesn't pay
Apple aims to simplify the process of buying a Mac, one kid learns the hard way that stealing is bad, and we're shocked -- shocked! -- to find that there's insider trading going on here. Read More


WEBCAST: MegaPath

7 Tips and 2 Models: Find a MSSP that Fits Your Business
Tune in with John Ramsey and hear about 2 models for handling network security and 7 tips on choosing a managed security services provider. You'll learn the benefits of working with an MSSP, and how important a provider's industry knowledge is to their business. Learn More

US Dept. of Commerce: New online privacy rules needed
The U.S. Department of Commerce recommends a new privacy bill of rights and an enforceable privacy code of conduct for online firms. Read More

More censorship, data breaches and devices: Security predictions for 2011
This past year has been a doozy in the security world. We kicked off the year by discovering operation Aurora, saw the first national-industrial sabotage attack with Stuxnet and are closing the year with Wikileaks about to become a constitutional crisis between the First amendment and a 1917 espionage law. Reality has well and truly become weirder than fiction. Read More


WHITE PAPER: Symantec

Reduce the Cost and Complexity of "Reactive" eDiscovery
To completely understand the value of an archive in electronic discovery, it helps to understand why companies started using archiving to support legal processes in the first place. Read this white paper to learn best practices for choosing an archive solution that scales and your companies needs. Read now!

OpenBSD back door claim now in doubt
The claim that the FBI planted a backdoor in OpenBSD a decade ago has been flatly denied by developer protagonists named as having been involved in the conspiracy in an email sent to OpenBSD founder, Theo de Raadt. Read More

Google adds site hacking notifications in search results
Google has started notifying its search engine users of sites in their list of query results that may have been compromised by hackers. Read More

Pro-WikiLeaks DDoS reprisals overrated, says expert
Headlines to the contrary, the WikiLeaks hacktivist attacks against Visa, MasterCard, PayPal and others last week were relatively small and disorganized, a security expert said. Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. Hackers get Ubuntu Linux booting alongside Chrome OS
  2. Google launches new 'Body Browser'
  3. Dropbox updated to 1.0, brings selective sync to masses
  4. Analyst expects Apple to sell up to 20 million iPhones on Verizon
  5. Apple updates AirPort Utility, base station firmware
  6. Tablet wars of 2011: The battle looms
  7. Is iOS jailbreaking an enterprise security threat?
  8. Hacker tool Metasploit now targeting Cisco network gear
  9. Microsoft teams with Apple, Oracle, EMC on 882 Novell patents
  10. Brief Facebook outage causes slight panic

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: