Search This Blog

Monday, January 10, 2011

Another look at Forrester's security recommendations

50,000 stolen iTunes accounts for sale | Mac App Store Pirate Raid Raises Security Concerns

Network World Security: Identity Management

Forward this to a Friend >>>


Another look at Forrester's security recommendations
After writing somewhat disparagingly about Forrester's recent paper "Twelve Recommendations For Your 2011 Security Strategy" ("Watch out for identity management obfuscators"), I heard from their PR chief, Phil LeClare. And he did include a copy of the report in his note to me. So I read it. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: ParAccel

Maximizing IT Insight for Financial Services
This white paper outlines these challenges and provides a clear path to providing the accelerated insight needed to perform in today's complicated business environment to reduce risk, stop fraud and increase profits. Read now!

50,000 stolen iTunes accounts for sale
Legitimate iTunes accounts have been hacked and access sold on to Chinese surfers, according to a local report. Read More

Mac App Store Pirate Raid Raises Security Concerns
Less than 24 hours after Apple launched the Mac App Store, hackers have found a simple way to pirate applications from the store. Applications from the Mac App Store that skimp on DRM features can be easily validated as genuine with a few clicks when they are downloaded from third-party websites. But security firm Sophos says the exploit not only leads to piracy, but also to malware. Read More


WHITE PAPER: Alcatel-Lucent

A Strategic View of Application Converged Networks
Access real-world lessons learned to help you successfully deploy a converged network. See how your technology choices can reduce complexity and costs while helping guarantee your convergence project's success. Read now

Self-Encrypted Drives Set to Become Standard Fare
We've seen this coming over time: Based on the Trusted Computing Group's standard, hard drives and solid state drives (SSD), are offering self-encryption built-in. The key difference with these next-generation encrypted drives is that these units have the encryption integrated into a single chip on drive in the drive. Read More

US revamps science, technology standard-setting efforts
NIST to bolster cloud computing, green building, emergency communications development.The National Institute of Standards and Technology (NIST) has been given new marching orders: expand work with the private sector to develop standards for a range of key technologies such as cloud computing, emergency communications and tracking, green manufacturing and high performance green building construction. NIST could also see its core science and technology budget double by 2017. Read More


WHITE PAPER: BMC

A "hindsight is 20/20" look at cloud computing
Learn why BMC Software's chief information officer foresees a future in which organizations realize how secure the public cloud is, underutilization of hardware is a thing of the past and daily business operations are more productive. Read More

Cell Phone Users Are Gullible, Report Says
Internet security company Trusteer has managed to get access to the log files of Web servers that hosted phishing Websites. Their conclusion? Cell phone users are idiots compared to their desktop computing counterparts. Well, they don't say it as bluntly as that, but their data is damning. Read More

Recalculating the telephony security equation
Among the threats that keep IT security managers up at night, attacks against phone systems have often ranked near the bottom. The last time we asked IT leaders about their telephony security plans, just 2% had experienced a security incident, and in almost all of these cases, the attack was internal misuse of phone systems for personal long-distance calls. Few had developed any sort of comprehensive security or risk analysis plan covering their voice systems. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. The 5 coolest things to come out of CES
  2. The stripping of freedom: EPIC vs. DHS on TSA body scanners
  3. The problem with Windows 7 tablets: They still run Windows
  4. Apple, Linux welcomes you to 1998!
  5. Verizon unveils 10 mobile devices with LTE built-in
  6. Cisco unveils Internet TV and more at CES
  7. Polar shift shuts down airport runway in Tampa
  8. Android Honeycomb: A detailed tour of Google's Tablet OS
  9. CES 2011: Gadgets galore
  10. EMC testing engineer stole nearly $1 million in duffel bag

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: