Search This Blog

Monday, February 28, 2011

Enterprise SSO from anywhere

Crime stats show 'Net users may be getting wiser | Security information and event management tools require 'fine tuning,' user says

Network World Security: Identity Management

Forward this to a Friend >>>


Enterprise SSO from anywhere
At the recent Healthcare Information and Management Systems Society meeting (HIMSS11), Imprivata announced a new advancement in enterprise SSO for mobile and remote personnel. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

RESOURCE COMPLIMENTS OF: Hitachi Data Systems

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. Download free 30-day trial

Crime stats show 'Net users may be getting wiser
From the It's About Time Department comes news ... It's only one data point from one year, but if this metric reported by a federal crime-fighting agency portends a trend, we may be seeing the stereotypically gullible Internet user growing wiser before our eyes. From an IDG News Service story on our site: Read More

Security information and event management tools require 'fine tuning,' user says
Security information and event management (SIEM) equipment is valuable for getting a bird's-eye view of security in the enterprise, but there are deployment challenges that IT security managers need to recognize. Read More

Is VoIP too secure?
It's hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on - especially if it traversed the Internet. Read More

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011. Read More


WHITE PAPER: BMC

A Proactive Approach to Enterprise Cloud Computing
Read more to learn about Business Service Management solutions that provide the visibility and automation IT needs to address cloud challenges. Read More

Can data stored on an SSD be secured?
Following a recent report that data on most SSDs is very difficult to completely erase, researchers and analysts say there are really only two methods to ensure sensitive data is secure once you're finished using your SSD. Read More

Smartphones, devices spark IT security "mobile melee"
While devices such as the iPhone, iPad, Blackberry and Android are in most cases welcomed into the corporate world, there's uncertainty about how to fit them into enterprise IT security practices that have been concerned so long by Microsoft Windows. Read More

Security hole identified in IE 9
Identity Finder CEO says Microsoft browser lacks a password for passwordsThe head of a computer security company is troubled by what he sees as a glaring security hole in Microsoft's Internet Explorer 9. Todd Feinman, CEO of Identity Finder, says IE 9 needs a master password that protects all other passwords an IE9 user would have stored in the browser. Mozilla Firefox has a "master password," but Internet Explorer doesn't. Read More

Microsoft fixes a security bug in its virus-scanner
Microsoft has patched a bug in its malware scanning engine that could be used as a stepping stone for an attacker looking to seize control of a Windows box. Read More


WHITE PAPER: Eaton

Maximizing UPS Availability
This white paper explains why, contrary to popular belief, modular UPS designs provide superior availability even though they typically contain more parts that could potentially fail. Read More

Fake online 'girlfriend' bilks $200,000 from Illinois man
Crime reaffirms that even the oldest online scams still workOn Friday we wrote of federal crime statistics that indicted a modest decline in online crimes, in particular, confidence scams where criminals pretend they are an inheritance recipient, lottery winner ... or romantic interest. (2011's 25 Geekiest 25th Anniversaries) Modest was the key point there, as indicted in this report in the Chicago Sun-Times: Read More

How one municipality is securing, managing Google Apps, Docs
It may have been the ease of use and lower costs that drove the city government of Panama City, Fla., to use Google Apps and Docs, but state regulations and IT governance procedures made them look for a way to secure and manage the environment. Read More

HIPAA privacy actions seen as warning
Two separate enforcement actions taken this week by the U.S. Department of Health and Human Services (HHS) for HIPAA privacy violations should serve as a warning to all health care entities, say privacy analysts. Read More

Three-time Pwn2Own winner knocks hacking contest rules
Organizers of Pwn2Own on Sunday defended the hacking contest's rules after a three-time winner criticized the challenge for encouraging researchers to "weaponize" exploits. Read More

Changing the status quo for security: Turn it on
Hackers have attacked the U.S. NASDAQ stock trading computers. Experts say cyber security in some large emerging world powers is almost non-existent. U.K. government e-mail is compromised. These recent headlines prove that computer security is not only not solved, it is degrading. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. Retro browser war: IE6 vs. Netscape in 2011
  2. The 6 biggest misconceptions about IPv6
  3. Happy Birthday Steve Jobs. Apple CEO turns 56 today
  4. Apple's iPad 2 one more thing: iTunes in the cloud?
  5. Snooping on social networks to vet jurors and hire employees
  6. Anonymous: It's a trap!
  7. Juniper leapfrogs Cisco with QFabric data center product blitz
  8. Pay no attention to that widget recording your every move
  9. Hollywood has had its fill of Apple brand placement
  10. Is IT skills gap keeping companies from hiring?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: