Monday, June 27, 2011

An English NSTIC (NSTUK?)

Apple patches 36 bugs in Snow Leopard, preps OS for Lion upgrade | LulzSec said it leaked Arizona police documents

Network World Security: Identity Management

Forward this to a Friend >>>


An English NSTIC (NSTUK?)
Perhaps as you're reading this, the U.S. National Institute for Standards and Technology (NIST) is holding National Strategy for Trusted Identities in Cyberspace (NSTIC) Privacy Workshop in Boston (Monday and Tuesday, June 27 and 28). Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

WHITE PAPER: Enterasys Networks

Enabling anIncreasingly Sophisticated Customer Base
Stephens Support Services provides the IT infrastructure and support for Stephens' brokerage, holding company and hospitality businesses. Stephens Support Services is a separate organization that partners with each business, solving unique challenges and positively impacting the bottom-line through technology. Read now!

Apple patches 36 bugs in Snow Leopard, preps OS for Lion upgrade
Apple on Thursday released the final feature update for Snow Leopard as it prepared users' Macs for the upcoming Lion upgrade set to ship next month. Read More

LulzSec said it leaked Arizona police documents
Lulz Security, the hacker group that earlier attacked websites of the Central Intelligence Agency and Sony, released Wednesday information that it claimed was hacked from the computers of an Arizona law enforcement agency. Read More

Security concerns aside, consumer IT takes over enterprises
To mitigate the risks associated with these technologies, organizations are moving away from a "trust-only" approach and deploying three-layer security and compliance strategies that include a combination of trust, policy and technology, the study says. Read More


WHITE PAPER: AirMagnet

Overlay vs. Integrated Wireless Security
A well-known best practice in the enterprise is to take a layered, defense-in-depth approach to network security to guard against different kinds of attacks and intrusions. Likewise, the wireless LAN (WLAN) environment requires multiple security layers, too. Read now!

PCI Council says mobile payment apps can meet security standard
The PCI Council Friday released a list of mobile payment app types that are eligible to meet its security standard; analysts critical of incomplete list. Read More

Key questions to ask your service provider about security
Back in March, IT services provider Avanade Inc. conducted a global study of 573 business leaders, asking them about their primary IT focus areas for the next 12 months. It comes as no surprise that cloud computing, security and IT consolidation topped the charts. While 60% of the companies surveyed said cloud computing is a top IT priority for the next year, 75% of the C-level executives in those companies place it at the top of the priority list. Read More

Microsoft exploits uproar over Firefox 4's retirement to beat IE drum
Addressing the IT furor over Mozilla's plan to pull support for Firefox 4, Microsoft issued an open letter affirming its commitment to support the current Internet Explorer edition through 2020. Read More


WHITE PAPER: HP

Shift to Innovation Over Converged Networks
The FlexNetwork paper addresses how HP FlexNetwork architecture can eliminate network silos, inconsistencies and layers that add complexity and hinder performance in your legacy networks—while at the same time freeing up stranded capital for IT innovations and new business model creation. Read now!

Anonymous, LulzSec bring bragging rights back to hacking, CTO says
Hactivist groups such as Anonymous and LulzSec hearken back to earlier days when Web attacks were done for bragging rights, not profits, says the new CTO of incident-response, forensics company Mandiant. Read More

Securing mobile devices requires enterprise and service provider controls
Enterprises are adept at securing and managing computing endpoints such as desktop and laptop computers, but most do not have the same controls and processes in place for what is likely the fastest-growing computing platform: smartphones and other smart mobile devices. Read More

Ponemon study: Cyber attacks more frequent, severe
Cyber attacks are becoming more frequent and severe, and the vast majority of businesses have suffered at least one data breach in the past year, a Ponemon Institute survey says. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. CFOs lack faith in CIOs and IT teams, survey shows
  2. Oh Cyberthugs... Run, run as fast as you can. FBI on victorious roll
  3. Cisco's core share holds steady
  4. Startup touting data center fabric that will put a scare into Cisco, Juniper
  5. Gartner: New security demands arising for virtualization, cloud computing
  6. The data breach quiz
  7. Why I dumped my 4G Android for an iPhone
  8. The iPhone 5 rumor rollup for the week of June 24
  9. Gartner: How to get a handle on mobile device management
  10. Cisco upgrades, broadens Quad

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment