Search This Blog

Monday, August 15, 2011

The Real Name mystery

10 scariest hacks from Black Hat and Defcon | USB devices: The big hole in network security

Network World Security: Identity Management

Forward this to a Friend >>>


The Real Name mystery
Sarah Caudwell (pseudonym of Sarah Cockburn, 1939-2000) was a British barrister and writer of detective stories. Sadly, she only finished four novels before her untimely death. Reviews of her work uniformly use words such as witty, delightful, clever, diverting, etc. I happened to be rereading her first ("Thus was Adonis Murdered") while writing last week's newsletters and was struck by a good analogy for the "Real Names" (see "Google+: antisocial networking?") issue. Read More


WHITE PAPER: Akamai Technologies, Inc.

A Perspective from the Edge of the Cloud
Akamai Chief Scientist and co-Founder Tom Leighton explores the major forces and technology layers driving the cloud computing movement, the types of architectural approaches emerging and an assessment of the challenges that must be overcome for cloud computing to broadly succeed. Read now

WHITE PAPER: BMC

Deliver Workload Automation Services to Business Users
Workload automation touches every aspect of the business. It is made up of all scheduled and ad hoc processes that support critical business functions. Read More!

10 scariest hacks from Black Hat and Defcon
Researchers showed all manner of serious attacks on everything from browsers to automobiles. Read More

USB devices: The big hole in network security
USB devices may be important tools foir business but they have security issues Read More

Business Apps on the iPhone: Dos and Don'ts
Techies love features and functions; business users are more focused on simplicity and speed. CIOs must seek to balance both worlds when developing a business app for the iPhone. Read More

Who are you? Non? Anon?
Gibbs ponders anonymity. At least, it might be Gibbs ... how would you know? Read More


WHITE PAPER: Fujitsu

Midmarket Blades Lead the Pack
A rock solid base for Dynamic Infrastructures. For IT organizations the blade server environment, in combination with virtualization technologies on various levels, is the IT infrastructure of choice to achieve considerable consolidation benefits and ensuring flexible usage of server resources. Read now!

Wireless "tattoo" monitors your health and could become electronic bandage
Researchers are touting a wireless skin-thin, microelectronic tattoo as an alternative to hard-wired electrodes for healthcare tests or monitoring and ultimately new applications such as electronic bandages. Read More

I cannot sleep at night because I just got back from Black Hat
I've attended the Black Hat Security conference in Las Vegas for many, many years now. It is by far the best security event each year and this year was no exception. Each year seems to go something like this for me: Read More

Security rundown for week ending Aug. 12
Not unlike the week before, this past week saw hacking once again grab everyone's attention. This time it was an alleged threat from the shadowy group Anonymous to "kill" the social-networking site Facebook. The reason given? Anonymous supposedly thinks Facebook abuses people's privacy and cooperates with authoritarian governments. Read More

Get control over your cross-platform identity management issues
According to the Gartner 2010 CIO Survey, identity management is the No. 1 IT security priority through 2011. This will be an ongoing concern well beyond 2011 as companies grapple with increasingly complex and disparate infrastructures and a multitude of new mobile access devices. New tools offer help in gaining control across heterogeneous platforms, even into the cloud. Read More


WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

PCI group outlines technology to conceal sensitive account information
The Payment Card Industry Security Standards Council today published guidelines aimed at helping merchants and others processing payment cards make effective use of what's known as "tokenization" technologies to conceal sensitive account information. Read More

If the riots resume, will the UK try to block social media?
Scrambling to deter future violent rioting, the U.K. government is considering shutting down social networks such as Twitter and Facebook during civil disturbances, but the heavy-handed proposal is already drawing criticism. Read More

5 reasons why SIEM is more important than ever
IT environments are growing ever more distributed, complex and difficult to manage, making the role of security information and event management (SIEM) technology more important than ever. Here's why. Read More

Firefox 8 to block unapproved add-ons
Starting with Firefox 8, Mozilla will automatically block browser add-ons installed by other software until users approve them, a company product manager announced yesterday. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. IBM says PC going way of vacuum tube and typewriter
  2. Harvard class project compares smartphones usability
  3. Purdue's hefty switch discounts 'unusual,' Cisco says
  4. 10 scariest hacks from Black Hat and Defcon
  5. I cannot sleep at night because I just got back from Black Hat
  6. The epic unpopularity of Windows smartphones
  7. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  8. Microsoft makes more money on cloud-based Exchange than legacy email
  9. 4 reasons Windows Phone 7 will beat iPhone and Android
  10. Augmented reality research: 'Offline to online recognition'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: