Search This Blog

Wednesday, August 03, 2011

You've lost the battle, can you win the war?

Network World Security: Identity Management - Newsletter - networkworld.com
Black Hat: System links your face to your Social Security number and other private things | Black Hat roundup: Let the electric-shock craziness begin

Network World Security: Identity Management

Forward this to a Friend >>>


You've lost the battle, can you win the war?
Last issue we talked about the survey Sailpoint had commissioned to judge employee attitudes about improper access to and disposal of sensitive corporate data. Today there's another survey to examine. Read More


WHITE PAPER: Kaseya

Why Corporations Need to Automate IT Systems Management
In today's competitive business environment, corporations across all industries are looking to provide quality products and services while at the same time cutting costs, saving energy and doing more with less. Automated IT systems management is the ultimate facilitator for achieving these goals…and more. Read now

WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Black Hat: System links your face to your Social Security number and other private things
Soon it will be practicable to take someone's photo on a smartphone and within minutes know their Social Security number and a range of other private data like their personal interests, sexual preference and credit status, researchers will tell the Black Hat security conference this week. Read More

Black Hat roundup: Let the electric-shock craziness begin
Ready to power on next week, the annual Black Hat Conference in Las Vegas promises to be the high-voltage event it has been in the past where security experts tear apart any naïve hope that there's really anything secure at all that was ever made by the high-tech industry. Read More

Check Point has sights set on 1Tbps firewall
Check Point Software has new, heavy-duty security gateway hardware for data centers and service providers, including one chassis that will grow to support a 1Tbps firewall. Read More


WHITE PAPER: Motorola

Less Cost and Congestion. More Performance and Trust
Giving brainpower to WLAN access points results in: • Intelligent direct routing • Network-aware access points that can easily reroute around overloaded components • Detection of RF interference • AP flexibility and options from AP 621 to AP 7181 Read now!

DARPA software to spin "dumb" photos or video into intelligence gold
If a picture is worth a thousand words, the scientists at the Defense Advanced Research Projects Agency (DARPA) would like to make that about a billion with a new software intelligent program. Read More

LulzSec gets Google+ boot, but returns
Hacker group LulzSec ("the world's leaders in high-quality entertainment at your expense") has had its initial Google+ account nixed this week, though LulzSec has quickly and brashly re-emerged with a new one Read More

FBI Eyeing Microsoft Technologies to Assist Law Enforcement
In dealing with how law enforcement must keep pace with technology, and the challenges represented by the ever-changing world of wireless devices, the FBI published Wireless Evolution [PDF]. It was originally published in the March 2011 Emerging Technologies Research Bulletin, but this FOIA publication on Secrecy News was obtained by the Federation of American Scientists. Read More


WHITE PAPER: Citrix Systems

Case study: Getting started with desktop virtualization
The promise of virtualized desktops is widely recognized and desktop virtualization is topping most IT departments' priority lists. But while the "why" of desktop virtualization is clear, it's the "how" that is most challenging. Follow one customer's journey to a more agile and secure business environment. Learn more.>>

Zero-day vulnerability found in a Wordpress image utility
Hackers are exploiting a problem with an image-resizing utility called TimThumb that is widely used in many themes for the blogging platform WordPress, although some fixes have been made to the latest version. Read More

Advanced persistent threats force IT to rethink security priorities
The biggest business challenge today, in the minds of many information security officers, is the stealthy online infiltration by attackers to steal valuable proprietary information. The reality, they say, is that these so-called "advanced persistent threats" are so rampant and unrelenting they are forcing IT to rethink network security. Read More

Apple patches iOS security certificate flaw for iPhones, iPads
The latest iOS update corrects a security flaw in how Apple's mobile OS handled security certificates. Without it, hackers can create their own certifcates, opening iPhone and iPad sessions to capture and decryption. Read More

IT security's scariest acronym: BYOD, bring your own device
The torrent of smartphones and tablets entering companies has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and new security risks, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too! Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. Android Trojan records phone calls
  2. Why Wi-Fi as we know it is in trouble
  3. System links your face to your Social Security number
  4. 10 technologies that will change the world in the next 10 years
  5. Apple iPad 3 prototypes everywhere
  6. HP extends Cisco switch trade-in program
  7. WIPO orders that iPods.com domain be transferred to Apple
  8. Advanced persistent threats force IT to rethink security priorities
  9. Windows XP is a rootkit spawning pool
  10. Skype for iPad finally arrives, then quickly disappears

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: