Search This Blog

Monday, January 03, 2011

Avoiding “cloud anguish”

Chinese hackers dig into new IE bug, says Google researcher | Cisco Security Intelligence Operations Explained

Network World Security: Identity Management

Forward this to a Friend >>>


Avoiding "cloud anguish"
We're already seeing a lot of "cloud anguish" from noted opinion makers. Many are suggesting that organizations who are dragging their feet about getting into cloud computing should consider so-called "private clouds" as a first step. Read More


WEBCAST: Websense, Inc.

Web Security Gateway Solutions Demo
This demo provides a hands on view of Websense Web Security Gateway solutions and how they enable safe productive use of today's dynamic, interactive Web. Learn More Now!

WHITE PAPER: Brocade

Enterprises Focus on Performance, Coverage, Reliability
802.11n is rapidly becoming the technology of choice for wireless networking. A new survey reveals the challenges 802.11n poses, deployment trends, and the factors driving forward-thinking organizations to migrate. Read now!

Chinese hackers dig into new IE bug, says Google researcher
An accidental leak may have confirmed Chinese hackers' suspicions that Internet Explorer has a critical unpatched vulnerability, a security researcher said. Read More

Cisco Security Intelligence Operations Explained
Cisco SIO provides IP reputation to Cisco security products This post is a followup post from my colleague Garett Redelings, Enjoy! --- Last month I had written about Cisco's IronPort Application Visibility Controls. The information here on the Cisco SIO is a follow up based on readers comments to the previous article. You can read that article by clicking here. What is the Cisco Security Intelligence Operations? Read More


WHITE PAPER: Oracle

Four Secrets to Innovating with Packaged Applications
Based on these customer successes, Oracle has identified four innovation secrets that every applications customer ought to know about. This session analyzes these secrets and shares insights into why each of them dramatically improves investment returns. Learn More Today!

Cisco TrustSec Makes Your Network Identity Aware
Cisco TrustSec technology provides switch to switch wire speed encryption services and security group tagging of ethernet frames. But what it really does is allow you to implement the most robust identity aware network with services on the planet. This technology, if Cisco executes on it properly, could forever change the way we design secure networks. Today's business networks are so open and... Read More

US to offer plethora of prize competitions to solve tough problems
Bill authorizes Feds to use prize competitions to solve complicated problemsGot a complicated problem? Hold a prize competition to solve it.  That's the basic idea behind the America Competes Act renewed by Congress this week. Read More


WHITE PAPER: Oracle

Application Quality Management
Read this white paper to learn how AQM solutions include thorough testing capabilities that can help users identify application quality and performance issues prior to deployment, saving valuable time, money and reputation. Learn More Today!

2011 tech priorities: Are you ready to shake things up?
Concerns about the economy haven't evaporated, but companies aren't standing still waiting for a bailout. They're working to find new opportunities for growth. We've identified six key areas where IT can help reshape the business and equip employees to do their jobs more efficiently and effectively. Read More

IP theft is illegal, unethical and costly
One of the tired arguments offered by intellectual property (IP) thieves is that stealing software or music causes no significant harm to the owners of the IP. Read More

Intel's upcoming Core chips to secure streaming movies
Intel on Monday said that it was building a hardware security layer in its next-generation Core chips to prevent streaming movies from being copied. Read More

2011 tech priorities: Moving to a next-generation firewall
What should enterprises expect if they want to make the transition from a traditional firewall to a next-generation firewall? It starts with a decidedly different way of thinking about security goals. Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. U.S. to offer plethora of prize competitions to solve tough problems
  2. Skype service disruptions continue into second day
  3. What if all the world ran Linux?
  4. The weirdest, wackiest and stupidest sci/tech stories of 2010
  5. Will 2011 be the year of mobile malware?
  6. Man used neighbor's Wi-Fi to threaten Vice President Biden
  7. Microsoft confirms critical IE bug, works on fix
  8. Brocade balances SAN base with new data center reality
  9. Santa Claus placed on watchlist as possible terrorist
  10. U.S. sets out to build photon-based optical networks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: