Wednesday, July 06, 2011

Safer mobile transactions

US intelligence agency wants technology to predict the future from public events | How to live with malware infections

Network World Security: Identity Management

Forward this to a Friend >>>


Safer mobile transactions
Last week ("More on biometrics") I recommended "biometric recognition as well as using passwords and SMS codes" for more secure mobile banking transactions. Long time reader Patrick O'Kane (he's chief architect for identity and access management services at Unisys) pointed me to a solution that does just that. Read More


WHITE PAPER: Avaya

Independent Lab Comparative Review
MierConsulting engineers conducted an hands-on, comparative review of three leading contact center packages, focusing on these products' multimedia, mixed voice and text-based contacts - capabilities. Read Now

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

US intelligence agency wants technology to predict the future from public events
Publically available data that could be aggregated and used by intelligent systems to predict future events is out there, if you can harness the technology to utilize it. That's one of the driving ideas behind a program that the Intelligence Advanced Research Projects Activity (IARPA) group will detail at a Proposer's Day conference in Washington, DC next month. Read More

How to live with malware infections
Get used to it: Malware can't be completely blocked or eliminated. But you can manage your PCs, mobile devices, and networks to function despite being infected Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Private industry group leaps into the cybercrime fight
A consortium of eight companies launched a campaign on Tuesday to provide better training for law enforcement agencies in order to tackle cybercrime, which costs the U.K. economy tens of billions of pounds annually. Read More

EU upset by Microsoft warning about US access to EU cloud
Members of the European Parliament have demanded to know what lawmakers intend to do about the conflict between the European Union's Data Protection Directive and the United State's Patriot Act. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Hackers claims Apple online data was compromised
A list of 27 user names and encrypted passwords apparently for an Apple website was posted to the Internet over the weekend along with a warning from hacker group Anonymous that the Cupertino-based computer maker could be a target of its attacks. Read More

Is the operating system dead?
One of the problems dismaying information assurance professionals today is the avalanche move towards mobile devices taking over computing for most users. A recent study predicts "U.S. mobile handset data traffic will grow from 8 petabytes per month this year [2010] to 327 petabytes per month in 2015." That would translate to an annual compound growth of about 110% per year. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. 5 hot social networking sites
  2. New York Times has a lot of angry iPad subscribers after latest gaffe
  3. Cisco Cius is not a tablet
  4. Is the operating system dead?
  5. A few suggestions for destroying the 'indestructible' botnet
  6. What's so cool about SIP?
  7. HP plans major enterprise push for TouchPad
  8. IBM takes dim view of EU claims
  9. NYC mayor demands $600M refund on software project
  10. Google Chrome hits 20% global share as Microsoft continues browser slide

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment