Search This Blog

Wednesday, August 17, 2011

Useful new technology for access control

FBI warns of growing car-buying cyberscams | World Gone Mad: Microsoft Security Praised Again? MS Researchers Embracing GIMP?

Network World Security: Identity Management

Forward this to a Friend >>>


Useful new technology for access control
Frequently I read about or hear about a new product, service or application and say to myself, "What were they thinking?" But, just occasionally, I'll say, "Why didn't I think of that?" Read More


WHITE PAPER: Sybase

The Enterprise Mobility Guide 2011
The Enterprise Mobility Guide 2011 features articles by industry experts, analysts and top executives on the latest mobile enterprise trends, real-world success stories, security requirements, device management, app development and more. Get a copy now, compliments of Sybase. Read More

WHITE PAPER: F5

Hardware Load Balancing
A comprehensive F5 solution readies application infrastructure for a successful implementation of the re-engineered Microsoft Exchange Server 2010. Learn More!

FBI warns of growing car-buying cyberscams
The FBI's Internet Crime Complaint Center (IC3) this week issued an alert about an online car-buying cyberscam that has been rearing its ugly head lately. Read More

World Gone Mad: Microsoft Security Praised Again? MS Researchers Embracing GIMP?
If you aren't sitting, you might do so, since hackers are praising Microsoft security, Kapersky Labs likes Microsoft's security, and now IE9 has been crowned with offering the best protection against drive-by-downloads. If that didn't shock you, how about Microsoft Research using the open-source graphic editor Gimp to build a prototype for tracking changes to binary files like images in a revision... Read More

Software pirate gets two years in prison for selling counterfeit Microsoft, Adobe, Intuit and Symantec software
The US Department of Justice this week said a woman was sentenced to two years in prison and ordered to pay $441,035 in restitution for selling more than $400,000 worth of counterfeit software. Read More


WHITE PAPER: IBM

Realize More Business Value
Read the white paper and learn how IBM Tivoli® Security Management for z/OS® can safeguard your business—and deliver rapid ROI. Read Now

Outsourced and fired, IT workers fight back
On the day they were fired early last year, about 40 IT employees at Molina Healthcare Inc. had been gathered in a conference room for what they were told would be a planning meeting. At the same time, laptop computers were being collected from the assembled workers' desks. Read More

Driver using two cell phones gets 12 month driving ban
This guy is the poster boy for why cell phone usage in cars should be banned in more places. According to press out of the United Kingdom, a man who was driving at 70MPH while texting on one phone and talking on the other has been banned from driving for a year. Initial reports said that the driver, David Secker was apparently using his knees to steer the car, an accusation he refuted in court apparently.... Read More

Your rude co-worker may hurt you outside the workplace too
The stress created by rude co-workers can be so intense that, at the end of the day, it is taken home by the worker and can damage the well-being of the worker's family. That was the main conclusion of a Baylor University study of 190 workers and their partners that looked at how a co-worker's rudeness can impact relationships beyond the workplace. Read More


WHITE PAPER: Akamai Technologies, Inc.

A Perspective from the Edge of the Cloud
Akamai Chief Scientist and co-Founder Tom Leighton explores the major forces and technology layers driving the cloud computing movement, the types of architectural approaches emerging and an assessment of the challenges that must be overcome for cloud computing to broadly succeed. Read now

Chrome improves anti-malware blocking score by 340%
Google's Chrome blocked four times more malicious sites and malware than a year ago, but Firefox 4 was much less effective at warning users of danger than Mozilla's browser last year, according to a report from NSS Labs. Read More

The changing face of identity and location security
For two decades, the dominant security model has been location-centric. We instinctively trust insiders and distrust outsiders, so we build security to reflect that: a hard perimeter surrounding a soft inside. The model works best when there's only one connection to the outside, offering a natural choke point for firewall defense. Read More

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data. Read More

US and UK zombies demand top dollar
Denizens of the malware underworld who sell access to compromised computers do so at varying rates depending on where the machines are located, researchers told the Usenix Security Symposium this week. Read More

Internet Explorer is best at protecting against drive-by downloads
Internet Explorer is better at defending against drive-by downloads than competitors' browsers and the contest isn't even close, according to a worldwide test of browsers by security research firm NSS Labs. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. Driver using two cell phones gets 12 month driving ban
  2. Cops use device to find child porn on wireless networks
  3. WiMAX is dead
  4. 20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
  5. 10 scariest hacks from Black Hat and Defcon
  6. IT recruiting a casualty of the recession
  7. Internet Explorer is best at protecting against drive-by downloads
  8. Google lashes out at patent trolls with Motorola buy
  9. Steve Jobs chatting with Bill Gates in 1991
  10. Windows 7 vs. Windows 8

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: