Search This Blog

Monday, March 07, 2011

Ever and anon

300,000 clients of umbilical cord blood bank at risk of ID theft | 20 hot IT security issues

Network World Security: Identity Management

Forward this to a Friend >>>


Ever and anon
When you spend a significant amount of time (in my case more than 15 years) enmeshed in a particular topic (e.g., identity management) some discussions (you might call them arguments) periodically arise with predictable regularity. That is, whenever new people are added to the discussion those evergreen topics will rise up once again. It happened in a discussion I was monitoring last week. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Quest Software

It's 9am. Do You Know What Your Directory is Doing?
In this new Quest Software white paper, you'll see how to get more information that native logging alone can't provide. See how you can get real time, centralized information, and how doing so maximizes Active Directory performance. Read More

300,000 clients of umbilical cord blood bank at risk of ID theft
Storage tapes lost to car break-in outside San Francisco data center The world's largest stem cell bank, Cord Blood Registry, has mailed data-breach warning letters to some 300,000 people after storage tapes and a laptop were stolen from an employee's car. The break-in occurred just before midnight on Dec. 13, 2010 outside of a private data center in San Francisco called 365 Main Street, according to a police report, yet at least some of those put at risk received... Read More

20 hot IT security issues
From malware on Google's Android phones to the U.S. Defense Advanced Research Projects Agency trying to understand how stories or narratives impact security and human behavior, the security world certainly is never boring. Here we take a look at 20 security stories that have shaped the industry in the past few months. Read More

Wordpress recovers from huge DDoS attack
Politically motivated hackers are being blamed for a large Distributed Denial of Service attack (DDoS) on the Wordpress blog management system that left many customers experiencing severe disruption on Tuesday. Read More

What constitutes defamation on Twitter? Rocker Courtney Love has an idea
Twitter rant to cost rocker $430,000Rocker Courtney Love has never been known for her shy, refined ways and today it seems one of her bad days when she went on a Twitter rant  will cost her $430,000. The case stemmed from a rant Love posted in 2009 against Dawn Simorangkir the designer of a fancy clothing line. Love allegedly owed her money and much online nastiness ensued. Read More


WHITE PAPER: AMD

Leveraging Big Data for Competitive Advantage
The ability to navigate large data sets is giving companies new insights into their markets and delivering competitive advantage. This paper written by AMD Senior Fellow, Keith Lowery, introduces the main hardware and software concepts of the new trend called "Big Data". Read now!

We need to ignite a Layer-1 revolution
Egypt's revolution was heralded as a success story for social media services such as Twitter and Facebook. Western journalists fawned over every rare example of social media, ignoring the more mundane but far more nt communication services such as cellular phone calls and text messaging. The really interesting story out of Egypt, and more recently Libya, Iran and other places was the communications blackouts imposed by each regime. While the west focused on layer-7 technologies, the tyrants were smart enough to strike at the root of their citizens efforts: layer-1 physical layer connectivity for phones. Read More

Beijing to track people's movements via their mobile phones
China plans on tracking the movements of people in Beijing using their mobile phones, a measure that while aimed at relieving traffic congestion, could set off concerns over misuse. Read More

Prison for four who ran credit card fraud market
Four men who ran what U.K. police say was the largest English-language criminal forum for selling stolen credit card numbers and the tools to steal data were imprisoned for a combined total of more than 15 years, according to the Metropolitan Police. Read More

Secure best practices no proof against Stuxnet
A Tofino Security report shows that well-secured computer systems would still get infected with Stuxnet. Read More


WEBCAST: Infoblox

Automation Gives IT Network Stability
On this webinar, IT staff at Children's Hospital of Philadelphia will discuss how the hospital is using Infoblox network automation products to deliver "Life Critical" Network Uptime, augment current HIPAA strategies & simplify tasks. Register Now

Cybercriminals targeting point-of-sale devices
Point-of-sale payment processing devices for credit and debit cards are proving to be rich targets for cybercriminals due to lax security controls, particularly among small businesses, according to a report from Trustwave. Read More

Germany identifies a secure way to deal with spam
In theory, stopping spam is easy: just make it uneconomic to send millions of messages by charging for each one sent, or make senders authenticate their identity to stop address spoofing and simplify blocking. Read More

Lock down your mobile handheld devices for ultimate security
As corporations enable more and more true enterprise applications via mobile smart phones and tablets, the need for tight security on these devices will grow. Mobile Active Defense has a non-intrusive solution that mirrors in the mobile world what you've already built for your fixed environment. Read More

Are you dressing the part for the security career you want?
Do the clothes we wear set the stage for success or being stuck in our security careers? Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. IPv6 on home routers and DSL/cable modems: FAIL
  2. Cisco, sources reveal data center next steps
  3. Tablet Tumble: iPad 2 vs. Motorola Xoom
  4. 20 hot IT security issues
  5. Real life HAL 9000: computers reacting to human emotions?
  6. First look at Apple iPad 2: what's new, unchanged, still missing
  7. Open source expert takes on the hardest job at Microsoft
  8. iPad 2 both excites and frustrates business customers
  9. Google gives antiquated 404 page a makeover
  10. 4 reasons why Apple and its iPad still rule the tablet market

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


4 comments:

Anonymous said...

Have yоu ever thought аbout adding
a little bit more than juѕt your аrticles? Ӏ meаn,
ωhаt уou ѕay is valuаble
and everythіng. Neverthelesѕ thіnk оf if уou adԁed some great visuals
or video clipѕ to give уour postѕ morе, "pop"!
Your content is еxcellеnt but with pics and video clips, thіs website could definitely be one of the greatest in its niсhe.
Very goοd blog!

Look into my ωеb ѕite: social media

Anonymous said...

Please let me knοw if you're looking for a writer for your weblog. You have some really good articles and I believe I would be a good asset. If you ever want to take some of the load off, I'd
гeally likе to wгite some material for yоur blog in еxchаnge for а link back tο mine.
Please send me an emaіl if intеrested. Thanks!


Feеl fгee tо ѵisit my wеb pаge cellulite

Anonymous said...

Whаt's Happening i am new to this, I stumbled upon this I'νe
founԁ It absolutely uѕеful and іt has helped me out loads.

I hope to give a сοntгіbutіon & hеlρ other customers liκe
іts aidеd me. Great job.

Mу ωеblog ... abnehmen tipps

Anonymous said...

Stunning quest there. What happеned after?
Goоd luck!

Also visit my ωebpаge ... beat premature ejaculation