Search This Blog

Wednesday, August 10, 2011

Google+: antisocial networking?

Microsoft expects Internet Explorer exploits within 30 days | Privacy Groups Protest Massive DHS Database of Secret Watchlists

Network World Security: Identity Management

Forward this to a Friend >>>


Google+: antisocial networking?
Last issue we started looking at Google's new social network, Google+, and its "Real Names" policy. We discussed the problem of using a single name as your identifier with all of the various "Circles" you can create, presumably to keep your boss from seeing the postings of your "homeboys" about that little party on Saturday night. But being only able to use a single name isn't the worst problem. Read More


WHITE PAPER: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WHITE PAPER: IBM

The Value of Smarter Datacenter Services
This paper provides an overview of how IT organizations can optimize across the entire life cycle of their datacenters and build a strong foundation for future IT operations. Read now

Microsoft expects Internet Explorer exploits within 30 days
Microsoft's monthly patches released today include a critical fix for seven holes in Internet Explorer which, if left unpatched, are considered "likely to see reliable exploits developed within the next 30 days." Read More

Privacy Groups Protest Massive DHS Database of Secret Watchlists
Homeland Security has a plan to expand its Watchlist Service by duplicating the FBI's existing system of watchlist records and then feed that info into a massive database in which more government people would have immediate access. According to the FBI, the consolidated Terrorist Watchlist is "one of the most effective counterterrorism tools for the U.S. Read More

DARPA expands insider threat research
The ability to detect insider threats and behaviors from a plethora of live data is the goal of an ambitious research program being undertaken by the military's Defense Advanced Research Projects Agency (DARPA). Last week DARPA took a big step toward realizing the potential of the program it calls Anomaly Detection at Multiple Scales (ADAMS) by picking Raytheon to help develop it further. Read More

Apple issues Lion disk disaster recovery tool
Apple has released a utility that builds a Lion recovery disk on a USB flash drive, giving users a way to restore their Macs if the machine's hard drive fails completely. Read More


WHITE PAPER: Citrix Systems

Gartner 2011 Planning Guide: Network and Telecom
Read the Gartner Research Note, "2011 Planning Guide: Network and Telecom," and discover how to keep up with the most important networking trends for 2011. Includes practical guidance to build an optimized data center, the best network infrastructure and true "anywhere Enterprise" capabilities. Get your report -- compliments of Citrix. Learn more

Raid on Russian firm ChronoPay explains the demise of Mac Defender malware
Earlier this Summer, a pesky piece of Mac malware called Mac Defender reared its ugly head. WIth SEO tactics in hand, links to Mac Defender appeared high on Google search results and when users clicked through, they were whisked away to a website where javascript began downloading a .zip file. Read More

Lessons in security leadership: Jamil Farshchi
The 2011 CSO Compass Award winners discuss prioritizing investments, learning lessons the hard way, and much more Read More

Lessons in security leadership: David Komendat
The 2011 CSO Compass Award winners discuss prioritizing investments, learning lessons the hard way, and much more Read More

A conversations with John McAdam of F5 Networks
I am going to continue my series of conversations with industry CEO's and today we have John McAdam of F5 Networks. 1. So why don't you tell us where you think the markets are at with [application delivery controllers] to start and then, do you still see growth? You can also include your other products. Read More


WHITE PAPER: Riverbed

Fine-Tune Your IT Performance
Learn how to bridge the gap between application performance management solutions that don't understand the underlying network and network management products that don't know how to map network traffic to applications. Learn more!

Visa to make it easier for merchants to adopt chip-based card payments
Visa today announced plans that will let qualifying merchants in the U.S. eliminate the need to annually validate their compliance with the Payment Card Industry (PCI) data security standard. Read More

Freedom and privacy, R.I.P.
Gibbs sees two kinds of privacy, and if both aren't already lost, they soon will be. Read More

US wants to build cybersecurity protection plan for cars
As cars and other forms of transportation increasingly rely on online systems for everything from safety to onboard entertainment, the cybersecurity threat from those who would exploit such electronic control packages has also Read More

Strip club owner undressed for software-based tax scam
A strip club owner who thought he'd use some fancy software to outwit the Internal Revenue Service was this week sentenced to a year in prison for the scam. Nicholas Faranso of Farmington Hills, Mich., was sentenced for conspiring to defraud the United States, the Department of Justice and IRS said. Faranso pleaded guilty on Jan. 12, 2011 to failing to report more than $500,000. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  2. 4 reasons Windows Phone 7 will beat iPhone and Android
  3. 16 milestones of a million, a billion or more ... from the past month
  4. How is the Cisco 76% off Nexus sale going over with customers? Not well.
  5. Defcon: The lessons of Anonymous? Corporate security sucks
  6. 'War texting' lets hackers unlock car doors via SMS
  7. Google Music vs. Amazon vs. Apple's iCloud vs. Spotify vs. Rdio vs. ...
  8. 10 cloud management companies to watch
  9. Hosed productivity suites: Google Apps or Microsoft Office 365?
  10. How Apple's iPhone transformed enterprise IT

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: