Search This Blog

Wednesday, March 16, 2011

What are the key identity management shows you should check out?

Do bots spell doom for online poker? | Security service on lookout for malware like ZeuS, SpyEye

Network World Security: Identity Management

Forward this to a Friend >>>


What are the key identity management shows you should check out?
I seem to have gotten out of the habit of telling you about upcoming events in the IdM/IAM arena, although you can always find them at the IdM Journal Events page. So today let me bring you up to date. Read More


WHITE PAPER: Coyote Point

Ensuring Disaster Recovery with Equalizer and Envoy
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geo¬graphic location or data center. See this and other independent product reviews available by clicking here. Read More

WEBCAST: CA

Success Story: DonorsChoose.org Moves to the Cloud
Oliver Hurst-Hiller, CTO of DonorsChoose.org talks about why they moved to the cloud. Learn More

Do bots spell doom for online poker?
It's difficult to imagine a different outcomePoker is my favorite pastime and I write about the Internet for a living, yet I have never played so much as a single hand online (at least not for money). The reasons are many - three kids and a mortgage primary among them - but The New York Times yesterday hit upon another that will do if those should ever prove inadequate: Bots. Read More

Security service on lookout for malware like ZeuS, SpyEye
Spotting notorious Trojans like SpyEye and ZeuS on compromised desktop computers is the goal of a new security service from Trusteer. Read More

Discretion when wearing a uniform
In the last column, I discussed constraints on speech when we are representing our employer. In general, any time we are on the job and representing our employer, we must be aware of our contractual obligations limiting freedom of expression as defined in our employment contracts. The other side of this obligation is that employers must be sure that their employment contracts are clear, explicit and fully within the law in formulating guidelines on speech by their employees. Read More


WHITE PAPER: CA

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

Proofpoint moves into mobile mail security
The secure communications provider announced mobile extensions of its encryption and e-mail archive applications. Read More

What do security auditors really think?
What do auditors involved in making sure companies meet compliance requirements really think? For starters, companies don't care much about privacy and security, while encryption gets applied at a minimum to meet rules, according to a study of 505 security auditors by Ponemon Institute. Read More

Health Net discloses loss of data to 1.9 million customers
HealthNet is notifying some 1.9 million customers that personal and health data may have been contained on drives that were found missing from a data center in California. Read More


WHITE PAPER: Compellent VMware

Optimize VMware Environments
With a Dell Compellent virtual storage platform and VMware virtual servers, you will have an economically efficient system that grows in line with your business needs. Read how to speed up storage provisioning, automatically fine-tune data placement, minimize disk capacity and integrate storage with SRM by implementing Fluid Data storage. Read now

Looking for vulnerable Web sites? Try schools
Educational institutions and social networks are the worst when it comes to leaving their Web sites exposed to known vulnerabilities, with health care and banks doing the best, according to a study by WhiteHat Security. Read More

Intel targeting security in the cloud with McAfee
Intel on Tuesday said it will use assets acquired from McAfee to provide cloud security services to protect the growing number of mobile devices that face malware and cyberattack threats. Read More

Anonymous releases Bank of America related documents
The group of online activists known as "Anonymous" has released a batch of e-mail concerning Bank of America that was given to the group by a whistleblower who worked for a related mortgage and vehicle loan insurer. Read More

UltraDNS aims to thwart 'WikiLeaks-style' protest attacks
Managed DNS service provider UltraDNS is touting a new offering that it says will protect Web sites against distributed denial of service (DDoS) attacks akin to the WikiLeaks-related protests that knocked the Visa and MasterCard Web sites offline in December. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Google Chrome 10
Google has released the stable version of Chrome 10 and users are now being automatically updated. As always, Chrome's new features focus on security, speed and simplicity, with greater JavaScript performance, sandboxing technology for Adobe Flash, password encryption and an easier-to-use settings interface. Here's a look at the new features.

MOST-READ STORIES

  1. Cell phones are 'Stalin's dream'
  2. Microsoft apologizes for using Japan disaster to market Bing
  3. 'Anonymity is authenticity,' Zuckerberg 'wrong'
  4. Quake damage to Japan cables greater than thought
  5. Happy Pi Day: More than 3.14... pictures of cool Pi creations
  6. Cisco releases first all-in-one security agent
  7. DHS chief Napolitano: Algorithms a big key in solving security
  8. iPad 2: Don't take it apart, or risk cracked glass
  9. IE9's final release is Monday. Will it make a difference?
  10. 15 best iPad apps for newbies

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: