Search This Blog

Wednesday, August 24, 2011

A gated social network for IT pros only

Lawsuit accuses comScore of extensive privacy violations | Twitter turns on SSL encryption for some users

Network World Security: Identity Management

Forward this to a Friend >>>


A gated social network for IT pros only
A planned IT-focused social network called Wisegate launches next month to provide a place online where IT executives can share problems, seek advice and swap their opinions about products and services. No vendors allowed. Read More


WHITE PAPER: GFI Software

PCI-DSS Compliance and GFI Software Products
The intent of this document is to provide you with GFI's understanding of the requirements, and how the GFI Software product line can assist you to meet PCI compliance as outlined in the PCI DSS Requirements. Read now!

WHITE PAPER: CA Technologies

Performance Metrics and the Cloud
Unlike static configuration management databases, which often contain information too outdated for real-time understanding, a dynamic operational service model provides relevant, timely information. Read More

Lawsuit accuses comScore of extensive privacy violations
A proposed class-action lawsuit filed in federal court in Chicago accused online tracking and analytics firm comScore of surreptitiously collecting Social Security numbers, credit card numbers, passwords and other data from consumer systems. Read More

Twitter turns on SSL encryption for some users
Twitter has made SSL available as a security option on its site and turned it on as the default setting for some but not all members. Read More


WEBCAST: BMC

Simplify, Improve, and Save with Dynamic Workload Management
Join us in our conversation with John McKenny, BMC vice president of Worldwide Marketing for Mainframe Service Management (MSM), as we uncover the advantages of dynamic workload management. Learn More!

Will desktop virtualization prosper over the WAN?
If virtualization can ease endpoint management and improve security, why stop at remote-office Windows PCs? More and more endpoints will simply render graphics over the network rather than receive software updates and store sensitive data on local memory and disk. Read More

Researchers find first Android malware targeting Gingerbread
Researchers have spotted the first malware that exploits a critical vulnerability in Android 2.3, aka Gingerbread, finding samples tucked into legitimate apps on Chinese download sites. Read More


WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

iPhone thief accidentally IDs himself via Photobucket
Photobucket has a cool mobile application that allows users to automatically upload mobile pictures to the company's photo-sharing website. That's something that Korey Heess is unlikely to forget anytime soon, after allegedly snapping a picture of himself that was used by police to identify him as a smartphone thief. Read More

China hacking video shows glimpse of Falun Gong attack tool
China Central Television ran a documentary with footage that shows a government attack tool being used against a Web site sympathetic to the spiritual movement Falun Gong. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The world's geekiest license plates
  2. 21 Chrome Web Apps for Serious Work
  3. Cisco aims for a go-anywhere router
  4. The real 'investment protection' story of the Cisco 6500
  5. Ridiculous FBI list: You might be a domestic terrorist if...
  6. What is a next-generation firewall?
  7. Cisco Announces the Cisco Certified Technician
  8. Palo Alto earns short list status
  9. Top 10 made-in-China iPhone apps
  10. Torvalds says, "Virtualization is evil"

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: