Search This Blog

Wednesday, March 23, 2011

Saving identity

Apple patches unused Pwn2Own bug, 55 others in Mac OS | US slowly, very slowly oozes rare earth assault

Network World Security: Identity Management

Forward this to a Friend >>>


Saving identity
Last issue I quoted two industry visionaries, Courion's Chris Zannetos and Netmesh's Johannes Ernst, on the troubles within the identity world -- both the enterprise side and the user-centric side. They painted a bleak picture of where we are and how we got here. Is there a chance to save the visions we've had for identity? Or should we just pack it in and go back to building silos of data protected by border security? Read More


WHITE PAPER: Ultrium LTO

Tape Fallacies Exposed
Misinformation about tape storage abounds. Most strewn about by a few disk-only proponents. Tape storage continues to play a vital role for data protection. David Hill of the Mesabi Group sheds light on the most common misperceptions. Read now

WHITE PAPER: Aruba Networks

Nemertes Research - The Great Divide
Yesterday's one-size-fits all campus networks have bifurcated into specialized access and data center networks. IT managers need to rethink how they purchase and implement access networks, with mobility as the first consideration. Read now!

Apple patches unused Pwn2Own bug, 55 others in Mac OS
Apple Monday issued patches for 56 Snow Leopard bugs, most of which can be exploited to hijack user machines. Read More

US slowly, very slowly oozes rare earth assault
Japan earthquake, rare earth mining increase could change landscape for USSometimes when you are so far behind in a particular game of strategy, it's ok to fallback, regroup and slowly reevaluate your plan of attack . Read More

WoW player offers $1,000 bribe to have account ban lifted
Quite a price to pay for not liking archaeology Yes, it could be just another Craigslist hoax, but my go-to guy for all things gaming says he doesn't think that's likely, so I'll just shake my head in wonderment. The Craigslist ad was placed on March 16 by a displaced World of Warcraft player from Irvine, Calif. It reads: I got my WoW account banned yesterday during the archaeology bot ban wave. I wasn't a gold farmer or seller, never bought gold.... Read More


WHITE PAPER: CA

Can You Harness Cloud Without Creating Storms?
In addition to extending its portfolio of solutions for cloud computing and virtualization, CA is investing aggressively in game-changing solutions to help you optimize your business value with insight to guide investment and sourcing choices, and ultimately, dynamic controls to orchestrate your service supply chain. Learn More

Student used spyware to steal passwords, change grades
A former high school senior from Orange County, California, has pleaded guilty to charges that he installed spyware on school computers in order to boost his grades. Read More

Cisco has long history with VPNs
In 1999, Network World tested a dozen VPNs, with a product from Altiga Networks coming in tied for second place. Our main complaint was the lack of split-tunneling capability, a feature that was quickly added. Read More

Tall tales and the Duck test
Tall tales do the online rounds all the time and the DoE's letter isn't what a lot of people believe. Read More


WHITE PAPER: CA

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

Berlin court rules Street View doesn't invade privacy
Google won a civil lawsuit in Germany lodged by a woman who contended its roving camera cars that shoot photographs for Street View violated her privacy. Read More

Proxy configurations: The lesser of two evils
As we tested the IronPort S-Series, we quickly ran into an old and unsolved problem with enterprise Web proxies: how to get end user browsers to actually use the proxy. Read More

The clock is ticking for encryption
In the indictment that led to the expulsion of 10 Russian spies from the U.S. last summer, the FBI said that it had gained access to their encrypted communications after surreptitiously entering one of the spies' homes, where agents found a piece of paper with a 27-character password. Read More

After RSA breach, are SecurID tokens in jeopardy?
The intrusion by hackers of security giant RSA, a unit of EMC, has left customers and analysts wondering if it is still safe to use millions of the one-time passcode tokens used to log into enterprise IT systems. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Microsoft Internet Explorer 9
Microsoft has a real competitor once again with IE9, released at midnight Monday night on Windows 7 and Vista after several months of beta testing. The focus is on speed, privacy and simplicity, with a stripped-down interface, tracking protection, pinned sites, jump lists and enhanced support for HTML5.

MOST-READ STORIES

  1. U.S. govt. sides against Microsoft in Supreme Court patent case
  2. On the company dime: Rogue game server admins tell all
  3. Should you stop using RSA SecurID tokens?
  4. 39 free security software tools
  5. Apple sues Amazon for trademark infringement over "App Store"
  6. Microsoft sues Barnes & Noble over Android
  7. Cisco sets the bar for mobile security
  8. Did hackers nab RSA SecurID's secret sauce?
  9. Google Voice coming to all Sprint phones
  10. The RSA hack FAQ

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: