Monday, August 22, 2011

Identity security in the cloud

With SSL, who can you really trust? | Security rundown for week ending Aug. 19

Network World Security: Identity Management

Forward this to a Friend >>>


Identity security in the cloud
There were a couple of announcements made at last month's Catalyst conference that I meant to draw to your attention but other things got in the way. Both are relevant to enterprise cloud-based computing so I'll talk about both today. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Remote Support for PCs, Macs, Tablets and Smartphones
Provide instant, on-demand remote support with LogMeIn Rescue. Without pre-installed software, quickly connect to PCs, Macs and smartphones anywhere in the world. Get in, solve the problem

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

With SSL, who can you really trust?
SSL, the encryption scheme that protects virtually all secure online transaction, requires that users rely on trusted third parties, but what if they can't be trusted? Read More

Security rundown for week ending Aug. 19
Some older assumptions about security -- such as firewalls are needed for perimeter defense, and we'll all make do with reusable passwords and browser-based SSL connections provide great security -- were once again ripped apart as we heard this week from several individuals who say they simply don't agree. Read More

Cisco adds wireless-only endpoint security option
Remember back in April, when Cisco overhauled its network management strategy and announced the Cisco Enterprise Prime product portfolio? The company has now decided to offer at least one component of the suite -- the Identity Services Engine (ISE) -- as a stand-alone, wireless-only module. Read More

Microsoft disables 'supercookies' used on MSN.com visitors
Microsoft has disabled an online tracking technology that a Stanford University researcher said allowed the company to sneakily track users on MSN.com -- even after they deleted browser cookies and other identifiers. Read More


WHITE PAPER: ADTRAN

Unified Communications: Getting the Green Light
In these articles, Network World and its sister IDG Enterprise publications explore the rising importance of UC within the enterprise and provide advice on how to create a working strategy. Learn more

Anonymous breaches another US defense contractor
The politically oriented hacking group Anonymous has released 1GB of what is says are private e-mails and documents from an executive of a U.S. defense company that sells unmanned aerial vehicles to police and the U.S. military. Read More

DoD: Sharing cyber-threat info with contractors is working
Halfway through a 90-day trial, the Department of Defense says it has stopped hundreds of attempted intrusions it would have missed otherwise without its pilot program of sharing classified information about cyber threats with military contractors. Read More

NSTIC director: 'We're trying to get rid of passwords'
The federal government's National Strategy for Trusted Identities in Cyberspace (NSTIC) program is trying to identify more secure alternatives to simple passwords that the government as well as anyone else might use in authenticating to online applications. Read More

AES proved vulnerable by Microsoft researchers
Researchers from Microsoft and the Dutch Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard (AES), the encryption algorithm used to secure most all online transactions and wireless communications. Read More


WHITE PAPER: Fluke Networks

Importance of Permanent Link Testing
This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. This technical paper provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links. Learn More Today!

NASA is NOT predicting an alien invasion
There has been a bit of a dust-up in the space information world this week as a number of press outlets seized on what at first blush was reported to be NASA study saying alien armies might destroy Earth because of our greenhouse gas issues. Thing is the report is real and interesting mind you but it isn't NASA's. Which has NASA concerned because a number of sites have headlines like this: Read More

Report: Spam is at a two-year high
Spam - particularly the kind with malicious attachments - is exploding, reaching a two-year high overall, which includes the spike last fall just before the SpamIt operation folded its doors, a security firm says. Read More

Synchronization software: Synctoy revisited
Data synchronization for two tower computers and a laptop is a daily routine for me. MAIN tower is in my home office; SPARE tower is in my university office; Norwich University supplies me with a laptop computer as well. For the last five years, I've been ensuring that these computers have the same data by using the Microsoft SyncToy versions. I wrote about my initial experience with SyncToy in 2005. Read More

Can the Obama Administration fix your identity management problems?
Can the Obama administration fix your identity management problems? Read More

Dropbox cloud was a haven for data thieves, researchers say
Files entrusted to cloud-storage provider Dropbox were susceptible to unauthorized access via three attacks devised by security researchers, but the provider has since closed the vulnerabilities. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. HP's webOS crashes under Apple, Android pressure
  2. Torvalds says, "Virtualization is evil"
  3. Linus Torvalds: ARM has a lot to learn from the PC
  4. With SSL, who can you really trust?
  5. The collar bomber's explosive tech gaffe
  6. HP PC spin-off puts pressure on Microsoft to nail Windows 8
  7. HP plans PC spinoff, $10 billion Autonomy buy
  8. HP kills tablets, confirms PC spin-off plans
  9. Dropbox cloud was a haven for data thieves, researchers say
  10. NSTIC director: 'We're trying to get rid of passwords'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment