Search This Blog

Wednesday, June 29, 2011

More on biometrics

Symantec finds big differences in iOS, Android security | IBM exposes top future networked healthcare devices

Network World Security: Identity Management

Forward this to a Friend >>>


More on biometrics
Last week's newsletter "RSA: Lessons learned," which was about taking another look at biometrics, drew some interesting responses. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Symantec finds big differences in iOS, Android security
Apple iOS and Google Android have some big differences when it comes to mobile security, creating distinct potential vulnerabilities for enterprises embracing devices running these operating systems, according to analysis by Symantec. Read More

IBM exposes top future networked healthcare devices
IBM came out with a study today that looks at what future healthcare applications and devices, be they PCs, tablet or smart phone might look like. Read More

New scoring systems for software security: CWSS and CWRAF
Companies get a framework to evaluate software vulnerabilities, as the consequences of failing to patch flaws become clearer. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Supreme Court to weigh in on warrantless GPS tracking
The U.S. Supreme Court has decided to hear a case involving the government's authority to conduct prolonged GPS tracking of suspects in criminal cases without first obtaining a court warrant Read More

Man sentenced to 13 years in Operation 'Phish Phry'
A 27-year-old man has been sentenced to 13 years in prison for managing a phishing operation in conjunction with Egyptian hackers that looted consumer bank accounts. Read More

LulzSec's parting Trojan is a false positive
The LulzSec hacking group sailed off into the sunset Saturday, leaving behind a treasure trove of stolen data along with what some antivirus programs identified as a nasty surprise for anyone who downloaded the Torrent file: a Trojan horse program. Read More


WHITE PAPER: Fluke Networks

Importance of Permanent Link Testing
This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. This technical paper provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links. Learn More Today!

Cellcrypt releases encrypted voice call app for the iPhone
Cellcrypt released a version of its voice encryption software for Apple's iPhone on Tuesday, adding to its portfolio of software to prevent eavesdropping on calls. Read More

Mastercard.com slammed again as punishment over WikiLeaks
MasterCard's main website was unavailable for some time on Tuesday as it appeared hackers were again targeting the company for its refusal to process donations for the whistle-blowing site WikiLeaks. Read More

Tumblr hit with huge phishing attack
Tumblr is dealing with an aggressive phishing campaign. Only recently launched, it aims to steal log-in credentials and employs many of the well-known social engineering tactics that scammers use on social media sites such as Facebook and Twitter. Read More

Hackers steal info on military, defense personnel
Email addresses and names of subscribers to DefenseNews, a highly-regarded website that covers national and international military and defense news, were accessed by hackers and presumed stolen. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Facebook bans KDE application, deletes user photos
  2. Geekiest wedding dress ever
  3. Microsoft patent may ruin Skype
  4. Rootkit infection requires Windows reinstall, says Microsoft
  5. GNU Mediagoblin Project launches
  6. 12 of the slickest designs in enterprise tech gear available today
  7. Desktop PCs: Dead as a doornail, or maybe just a fax machine
  8. Android lovers: Don't overlook Nook
  9. Cisco defending base against HP, Juniper
  10. Zillow's rewrite of real-estate history upsets some homeowners

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: