Search This Blog

Wednesday, January 19, 2011

Real government identity cards

As PC Virus Turns 25, New Worry Emerges: Attack Toolkits | Security fail: When trusted IT people go bad

Network World Security: Identity Management

Forward this to a Friend >>>


Real government identity cards
It was perhaps serendipitous that the same week the brouhaha over The National Strategy for Trusted Identities in Cyberspace (NSTIC) broke I had scheduled an interview with Jeff Nigriny. He's the CEO of Certipath, a company intimately involved in real government identity cards. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: ParAccel

Stop Fraudulent Transactions
Learn how creative, iterative analysis detects and halts fraud in minutes, rather than hours or days by leveraging: • Massively Parallel Processing • Columnar database for faster responses • Schema-neutral, no tuning required • Built-in compression and encryption Read now!

As PC Virus Turns 25, New Worry Emerges: Attack Toolkits
25 years ago, two brothers from Pakistan released the Brain Virus. Today, hackers can buy ready-made toolkits to launch malware attacks - and this trend should concern you. Read More

Security fail: When trusted IT people go bad
It's a CIO's worst nightmare: You get a call from the Business Software Alliance (BSA), saying that some of the Microsoft software your company uses might be pirated. Read More


WHITE PAPER: Sophos

How to implement a data loss prevention strategy
This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by quickly looking at what's driving data loss prevention, the consequences of data loss and how it can be comprehensively tackled using Sophos solutions. Read Now

Criminal charges filed for AT&T iPad attackers
The U.S. District Court of New Jersey files criminal charges against alleged attackers of AT&T-accessible iPads Read More

Policy disputes, uncertainties pose safety risks for NASA
NASA panel warns of a bumpy future for NASA's safety recordPerhaps for a moment - in those fleeting seconds after President Obama signed the space agency's 2011 budget -- NASA's immediate future seemed set. Read More


WHITE PAPER: Phone Factor

Keep Hackers Out: Out-of-Band Multi-Factor with Any Phone
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Learn More

Study: Cloud breaches show need for stronger authentication
The number of security breaches is rising as organizations increase their reliance on cloud-based services, collaboration tools and enabling users to access networks, Forrester says in a new report. Weak usernames and passwords are making matters worse. Read More

Will electronic toll systems become terrorist targets?
Weaknesses in 802.11p vehicular wireless networks could make them targets for terrorists seeking to wreak havoc on the nation's highways, according to a briefing scheduled this week at the Black Hat DC conference. Read More

MPack, NeoSploit and Zeus top most notorious Web attack toolkit list
About two-thirds of malicious Web activity can be traced back to botnets and exploit code built using popular attack toolkits like MPack and Zeus sold in the underground economy, according to a new Symantec report. Read More

Facebook halts controversial sharing feature for now
Facebook said Monday it will temporarily disable a controversial feature that allows application developers and third-party web sites to access the mobile phone numbers and addresses of certain users. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Facebook photos: Opt-out or tag you're it
  2. Will electronic toll system become terrorist targets?
  3. The 10 biggest hoaxes in Wikipedia's first 10 years
  4. "Stealing Wi-Fi" isn't about Wi-Fi
  5. Apple's Jobs takes medical leave
  6. Israel tested Stuxnet worm, says report
  7. Gartner's Magic Quadrant disses Amazon cloud
  8. IBM will not be a networking company
  9. 15 crazy Japanese tech gizmos
  10. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: