Search This Blog

Wednesday, January 05, 2011

Watch out for identity management obfuscators

Sudden spam drop leaves experts baffled | US begins sophisticated wireless jamming project

Network World Security: Identity Management

Forward this to a Friend >>>


Watch out for identity management obfuscators
Privileged user management, authentication, authorization, separation of duties, access governance – these all (and more) need to be part of your Identity Management systems. They're all interconnected, they all depend on properly identifying not only your users but also all of the things they use. In fact, it isn't the information that needs to be managed, but the access to that information. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Watchguard

Take Back Control: Increase Security, Empower Employees
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more. Read now!

Sudden spam drop leaves experts baffled
Spam volumes appear to have dropped to averages last seen in 2008 after an expected surge in bogus email over the Christmas period failed to materialise. Read More

US begins sophisticated wireless jamming project
DARPA wants smart system that can learn to jam new wireless threats automaticallyLooking to begin developing algorithms and other technology to automatically learn to jam certain new wireless transmissions that may threaten US military personnel. BAE Systems recently got about $8.4 million from the Defense Advanced Research Projects Agency to begin work on what's known as the Behavioral Learning for Adaptive Electronic Warfare (BLADE) system. Read More


WHITE PAPER: F5 Networks

Implementing DNSSEC to mitigate financial and brand risks
The problems of DNS security have long been known, which is why DNSSEC was developed. However, it is only now that widespread deployment is possible as the internet infrastructure is being readied to accept DNSSEC lookups and tools are available to remove the complexity involved in its deployment. Read now!

Hackers Get to the Root of Sony's PlayStation 3
A moment of silence for Sony's PlayStation 3, which on Sunday was reportedly stripped of its final defenses, including the linchpin security keys used to authenticate legitimate applications--and repulse illegitimate ones. Read More

Geinimi Android malware has 'botnet-like' capabilities
Lookout Mobile Security warned that it identified a new Android Trojan named Geinimi that is built to lift and transmit personal data from a user's phone and ship it to a remote server. Read More


WHITE PAPER: Extreme Networks

The High Performance Network for iSCSI
IT organizations have been focusing on creating a converged infrastructure to support high-performance iSCSI while allowing other applications to coexist on the network. Read now!

How Goldman Sachs will guard Facebook's privacy
Special 'investment vehicle' likely to draw attention from SEC No one should ever again question Mark Zuckerberg's commitment to privacy ... at least not as it applies to himself, his company, his employees, Goldman Sachs and millionaire investors. Read More

Good times projected for network security market in 2011
There's some early optimism about the information technology industry as the world steps into 2011. For one thing, the global network security market is expected to be on the rise, according to estimates from IDC, which forecasts a return to the growth of pre-recession levels this year. Read More

Dell buys SecureWorks for IT security services
Dell announced Tuesday it is purchasing security services vendor SecureWorks, expanding its range of IT management offerings. Terms were not disclosed. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. Espionage via spoofed White House eCard
  2. Wikipedia meets $16M fundraising goal ... the hard way
  3. Oversupply sends DRAM prices to one-year low
  4. CES 2011 Preview: Gadgets galore
  5. 2011 Outlook: Better than 2010 and really wild
  6. Microsoft blames server problem for Hotmail outage
  7. Toshiba to show no-glasses 3D TV at CES
  8. Will there be a jobless recovery for IT in 2011?
  9. Are you ready to flatten your data center network?
  10. How to take your enterprise Wi-Fi network to the next level

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: