Search This Blog

Wednesday, March 30, 2011

Directory design, architecture and nostalgia

FBI wants public help solving encrypted notes from murder mystery | Critical NASA network was open to Internet attack

Network World Security: Identity Management

Forward this to a Friend >>>


Directory design, architecture and nostalgia
It's time, once again, to look back 10 years and to see what was important in the identity arena in March 2001. Read More


WHITE PAPER: Oracle

The Department of Defense and Open Source Software
This white paper looks at the pros and cons of open-source software and helps organizations understand how to build a business case that is based on cost, schedule, performance and risks across the entire program lifecycle not just up-front program inception costs and considerations. Read More Now!

WHITE PAPER: IBM

Cloud computing Payback
Today, organizations of all sizes are investigating cloud computing and the benefits it can bring to their company. Given the numerous claims of savings and productivity improvements, it can become difficult to understand exactly how these benefits might apply to your particular IT environment. Read Now

FBI wants public help solving encrypted notes from murder mystery
The FBI is seeking the public's help in breaking the encrypted code found in two notes discovered on the body of a murdered man in 1999. Read More

Critical NASA network was open to Internet attack
Six NASA servers exposed to the Internet had critical vulnerabilities that could have endangered Space Shuttle, International Space Station and Hubble Telescope missions -- flaws that would have been found by a security oversight program the agency agreed to last year but hasn't yet implemented, according to a report by the agency's inspector general. Read More


WHITE PAPER: CA

Layered Tech expands to new markets with CA 3Tera AppLogic
As Layered Tech's customers required more complex services, the cost of servicing them increased. They needed a solution that would enable rapid reaction to hosting demands while helping to lower operating costs. CA 3Tera AppLogic is a turn-key cloud computing platform enabling infrastructure solutions that can dynamically adapt to changing needs. Learn More

Get in the ring: US, Europe vow to bash out Internet personal privacy protection
When it comes to protecting personal privacy on the Internet the United States and European Union have often clashed. And it's likely the future won't be much better. But officials from both sides of the ocean say they are now committed to fixing the problems that have kept the two worlds - which some say includes over 700 million users - apart. Read More

SailPoint takes identity management to the cloud
SailPoint put forward its strategy to extend the provisioning and access control capabilities of its IdentityIQ product to cloud-based environments. Read More


WHITE PAPER: AccelOps

Managing the Shift to Enterprise Private/Hybrid
This report explores the readiness, deployment and operational controls of an internal/private cloud and hybrid approaches. We review adoption considerations; virtualization and cloud delivery of IT services impact as well as the challenges associated with data centers monitoring cloud services. Read now!

Restaurant chain to pay $110,000 to settle breach claims
The Briar Group has agreed to settle claims that it failed to adequately protect credit card data of its customers. Read More

Anti-virus software driving you mad? 5 fight-back tips
Last week some Windows users struggled through unexpected PC slowdowns due to a security program bundled in with a Java update. Security programs still hog PC resources and pose annoyances -- but here's expert advice on how you can regain control. Read More

Companies pick and choose which data breaches to report
One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. Read More

McAfee's website full of security holes, researcher says
The McAfee.com website is full of security mistakes that could lead to cross-site scripting and other attacks, researchers said in a post on the Full Disclosure site on Monday. The holes with the site were found by the YGN Ethical Hacker Group, and reported to McAfee on Feb. 10, YGN says, before they were publicly disclosed to the security/hacking mailing list. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Hot technology at the annual CTIA wireless show
CTIA Wireless offers a look at the evolving mobile landscape, from handsets and apps to core network systems. Here's a few of the things that are hot at the show in Orlando.

First look at Firefox 4
Firefox 4 has finally arrived, after months of delays and after rival Web browsers Internet Explorer 9 and Chrome 10 already shipped. The browser gets a speed boost and several feature enhancements that are so significant that they all have their own proper names, like Panorama, JaegerMonkey and Firefox Sync. Were they worth the wait? Let's take a look.

MOST-READ STORIES

  1. McAfee's Web site full of security holes, researcher says
  2. No conspiracy theory needed: Tor created for U.S. gov't spying
  3. Microsoft scheme sniffs out unused wireless spectrum
  4. Diary of a wimpy kid: Google as open source big brother
  5. Paul Baran, Internet and packet switching pioneer, is mourned
  6. Should smartphones be allowed in the courthouse?
  7. How Apple played hard to get and seduced the enterprise
  8. Sprint to fight AT&T's buyout of T-Mobile
  9. Microsoft pays Nortel $7.5 million for IPv4 addresses
  10. New method finds botnets that hide behind changing domains

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: