Wednesday, March 30, 2011

Directory design, architecture and nostalgia

FBI wants public help solving encrypted notes from murder mystery | Critical NASA network was open to Internet attack

Network World Network/Systems Management

Forward this to a Friend >>>


Directory design, architecture and nostalgia
It's time, once again, to look back 10 years and to see what was important in the identity arena in March 2001. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Belden Wire

Going Green With Physical Layer Components
This white paper focuses on physical-layer design and discusses how advanced air-flow management technologies, high-performance cabling and connectivity, and IP-enabled network architecture can play an important role in bringing the green data center vision to fruition. Read More

FBI wants public help solving encrypted notes from murder mystery
The FBI is seeking the public's help in breaking the encrypted code found in two notes  discovered on the body of a murdered man in 1999. Read More

Critical NASA network was open to Internet attack
Six NASA servers exposed to the Internet had critical vulnerabilities that could have endangered Space Shuttle, International Space Station and Hubble Telescope missions -- flaws that would have been found by a security oversight program the agency agreed to last year but hasn't yet implemented, according to a report by the agency's inspector general. Read More


WHITE PAPER: Zetta

Cloud Storage and Data Protection Survey Results
A survey of more than 230 IT professionals probed their status and plans for cloud storage and disaster recovery. Cloud storage was already being used by 17% of the respondents for backup and over half of the respondents were planning to use cloud storage in the future. Read now!

Get in the ring: US, Europe vow to bash out Internet personal privacy protection
When it comes to protecting personal privacy on the Internet the United States and European Union have often clashed. And it's likely the future won't be much better. But officials from both sides of the ocean say they are now committed to fixing the problems that have kept the two worlds - which some say includes over 700 million users - apart. Read More

SailPoint takes identity management to the cloud
SailPoint Tuesday put forward its strategy to extend the provisioning and access control capabilities of its IdentityIQ product to cloud-based environments. Read More


WHITE PAPER: Splice Communications

The Benefits of Outsourcing Telecom Management
Choosing the right network solutions provider (NSP) will help businesses improve network reliability, service quality, operating efficiency, billing accuracy and better allocation of resources – all reducing the total cost of ownership of your network infrastructure. Many companies have realized the benefits of working with an NSP. Read now!

Restaurant chain to pay $110,000 to settle breach claims
The Briar Group has agreed to settle claims that it failed to adequately protect credit card data of its customers. Read More

Anti-Virus Software Driving You Mad? 5 Fight-Back Tips
Last week some Windows users struggled through unexpected PC slowdowns due to a security program bundled in with a Java update. Security programs still hog PC resources and pose annoyances -- but here's expert advice on how you can regain control. Read More

Companies pick and choose which data breaches to report
One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. Read More

McAfee's website full of security holes, researcher says
The McAfee.com website is full of security mistakes that could lead to cross-site scripting and other attacks, researchers said in a post on the Full Disclosure site on Monday. The holes with the site were found by the YGN Ethical Hacker Group, and reported to McAfee on Feb. 10, YGN says, before they were publicly disclosed to the security/hacking mailing list. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Hot technology at the annual CTIA wireless show
CTIA Wireless offers a look at the evolving mobile landscape, from handsets and apps to core network systems. Here's a few of the things that are hot at the show in Orlando.

First look at Firefox 4
Firefox 4 has finally arrived, after months of delays and after rival Web browsers Internet Explorer 9 and Chrome 10 already shipped. The browser gets a speed boost and several feature enhancements that are so significant that they all have their own proper names, like Panorama, JaegerMonkey and Firefox Sync. Were they worth the wait? Let's take a look.

MOST-READ STORIES

  1. McAfee's Web site full of security holes, researcher says
  2. No conspiracy theory needed: Tor created for U.S. gov't spying
  3. Microsoft scheme sniffs out unused wireless spectrum
  4. Diary of a wimpy kid: Google as open source big brother
  5. Paul Baran, Internet and packet switching pioneer, is mourned
  6. Should smartphones be allowed in the courthouse?
  7. How Apple played hard to get and seduced the enterprise
  8. Sprint to fight AT&T's buyout of T-Mobile
  9. Microsoft pays Nortel $7.5 million for IPv4 addresses
  10. New method finds botnets that hide behind changing domains

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment