Search This Blog

Monday, June 06, 2011

RSA's INsecurID

Does the IRS need more options to fight identity theft? | Battle looms over securing virtualized systems

Network World Security: Identity Management

Forward this to a Friend >>>


RSA's INsecurID
It looks like the other shoe has dropped in the RSA (the security division of EMC) data breach fiasco. Read More


WHITE PAPER: Netezza, an IBM Company

Oracle Exadata and Netezza TwinFin™ Compared
This ebook will provide the fundamental differences between the Netezza TwinFin® and Oracle Exadata solutions from the perspectives of query performance, simplicity of operation and value. The ebook will help you determine which solutions best meet your business needs and how to achieve optimal results from your data. Read now

WHITE PAPER: Avaya

Avaya Virtual Services Platform 9000
A high performance modular routing switch for core deployments. Core network infrastructure needs to be able to handle increased load without packet loss, while providing quick recovery times in case of a component failure. Learn More

Does the IRS need more options to fight identity theft?
The number of tax-related identity theft incidents is exploding and nowhere is that more obvious than at the Internal Revenue Service which as seen reports rice from 51,702 in 2008 to 248,357 in 2010. More on identity theft: IRS: Top 10 things every taxpayer should know about identity theft Read More

Battle looms over securing virtualized systems
There's growing consensus that traditional approaches to network security -- the firewall and intrusion-prevention appliances, the host-based antivirus software -- simply do not work well in virtualized environments for which they were never designed. Read More


WHITE PAPER: Avaya

Video Collaboration: Lights, Camera, User Adoption
Video deployment has been slow. Today, barriers are dissolving. Price points are dropping. CIOs are more engaged in driving the business forward with process and technology. Learn More

Secretary of State Hillary Clinton responds to Google accusations that China stole e-mail from US of
Secretary of State Hillary Clinton responds to Google accusations that China stole e-mail from US of Secretary of State Hillary Clinton responds to Google accusations that China stole e-mail from US officials From: networkworld Views: 2 0 ratings Time: 01:30 More in Science & Technology Read More

Hotmail and Yahoo users also victims of targeted attacks
Web mail users at Yahoo and Hotmail have been hit with the same kind of targeted attacks that were disclosed earlier this week by Google, according to security software vendor Trend Micro. Read More


WHITE PAPER: Avaya

Independent Lab Comparative Review
MierConsulting engineers conducted an hands-on, comparative review of three leading contact center packages, focusing on these products' multimedia, mixed voice and text-based contacts - capabilities. Read Now

Checklist for a successful security assessment
A security assessment is a request to analyze the risk of an IT solution. The request is initiated by a CISO (Chief Security Officer) or ISO (Information Security Officer) within a corporation. It is used to make sure that security concerns are met before changes are made to the information technology infrastructure. There are foundation plans which evaluate the state of new applications or infrastructure. Or there are incremental plans that address changes to the foundation plan. Read More

IRS: Top 10 things every taxpayer should know about identity theft
As part of a look at the impact of identity theft and the Internal Revenue Service, watchdogs at the Government Accountability Office issued the IRS' top 10 list of identity theft information everyone should be aware of. Read More

Top security nightmares: Privately owned iPhones, iPads and other mobile devices
IPhones, iPads and other employee-owned mobile gear are the most risky devices that can be connected to corporate networks, according to a new survey by ISACA, an international user group devoted to providing benchmarks and guidance for technology best practices. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. First look at Windows 8
  2. Clueless can hack Facebook in seconds over Wi-Fi
  3. Top 10 things every taxpayer should know about identity theft
  4. Cisco resorting to intimidation tactics
  5. Battle looms over securing virtualized systems
  6. Worst hackers ever?
  7. RSA's INsecurID
  8. 8 security considerations for IPv6 deployment
  9. Developers find a lot to love in Windows Phone 7 Mango
  10. Apple reportedly cracking down on iPad, iPhone giveaways

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: