Search This Blog

Wednesday, June 22, 2011

New from Aveksa -- RSA take note

Northrop Grumman constantly under attack by cyber-gangs | LulzSec hacker group denies it has stolen UK census

Network World Security: Identity Management

Forward this to a Friend >>>


New from Aveksa -- RSA take note
Aveksa just announced version 5.0 of its suite of Access Governance automation solutions, and there's a lot of meat in this release. Read More


WHITE PAPER: Quest Software, Inc.

Control and Manage Super User Access
Managing privileged – aka "super user" – accounts is vital for addressing your company's security concerns. In this Quest white paper, see why native management tools are limited, and discover a comprehensive suite of tools that makes managing privileged accounts quick and easy. Read it today.

WHITE PAPER: F5 Networks

Secure iPhone Access to Corporate Web Applications
This technical brief describes how the BIG-IP Edge Portal app for iOS devices provides simple, streamlined access to web applications that reside behind BIG-IP APM, without requiring full VPN access, to simplify login for users and provide a new layer of control for administrators. Learn More!

Northrop Grumman constantly under attack by cyber-gangs
About a dozen separate legions of organized hackers have been diligently attempting for years to break into aerospace and defense company Northrop Grumman to steal sensitive information, the company's chief information security officer (CISO) said at a Gartner security conference. Read More

LulzSec hacker group denies it has stolen UK census
The hacker group LulzSec denies it has stolen the entire results of the 2011 census for the United Kingdom, but if someone else has, it endorses the theft. Read More

Do you know where your security holes are?
We all worry that there's some lurking security problem in our servers. We do what we can, patching, following best practices, keeping up-to-date with training and news. But wouldn't it be great to have an automated tool to check our work? That's the promise of vulnerability analyzers: products that detect problems in configuration, applications, and patches. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

An update on security threats
Each year several vendors and organizations publish updates on the state of the art in security threats. Most of these updates could be entitled "Be nervous, be very very nervous." While it is never fun to read these reports, they do provide helpful insight into vulnerabilities that we should be aware of. With that in mind, we will use this newsletter to highlight some of the findings of a recent IBM report on security threats. Read More

Vulnerability analysis tools add compliance features
Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories, and other errors in configuration. Read More

NSA wants bulletproof smartphone, tablet security
The National Security Agency, America's high-tech spy agency which also plays a key role in approving hardware and software for use by the Department of Defense, wants to be able to outfit military personnel with commercial smartphones and tablets -- but based on a NSA security design. Read More


WHITE PAPER: Enterasys Networks

Enabling anIncreasingly Sophisticated Customer Base
Stephens Support Services provides the IT infrastructure and support for Stephens' brokerage, holding company and hospitality businesses. Stephens Support Services is a separate organization that partners with each business, solving unique challenges and positively impacting the bottom-line through technology. Read now!

IT admins gone wild: 5 rogues to watch out for
You can't survive without them. They wield enormous power over your systems, networks, and data -- the very lifeblood of your organization. Few people outside IT have any understanding of what they do, and fewer still exercise any oversight over their actions. Read More

Pentagon building Internet simulator to practice cyberwar
A model of the Internet where the Pentagon can practice cyberwar games -- complete with software that mimics human behavior under varying military threat levels -- is due to be up and running by this time next year, according to a published report. Read More

Hackers move fast to exploit just-patched IE bug
Just three days after Microsoft patched 11 bugs in Internet Explorer (IE), hackers are exploiting one of those vulnerabilities, Symantec said Friday. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. Gartner: IT should be planning, moving to private clouds
  2. 12 ways the cloud changes everything
  3. First look at Windows Azure
  4. Pilots spar over wisdom of relying on iPads in the cockpit
  5. Most IT pros don't fear losing their jobs to the cloud
  6. NSA wants bulletproof smartphone, tablet security
  7. Wi-Fi client surge forcing fresh wireless LAN thinking
  8. How RIM is getting left behind
  9. Company claims it can disregard GPL requirements
  10. Dropbox left document storage accounts open for four hours

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: