Search This Blog

Monday, July 27, 2009

Identity in the cloud

Microsoft rushes clutch patch for 'deep' bug in Windows, third-party apps; Best data loss prevention tools
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Symark
rule

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.

rule

Spotlight Story
Identity in the cloud

I spent a pleasant hour talking with Martin Kuppinger (of Kuppinger Cole + Partner) about "Externalizing Identity into the Cloud: Identity Services in Cloud and Outsourcing Environments" – and we even had a surprise guest. Read full story

Related News:

Microsoft rushes clutch patch for 'deep' bug in Windows, third-party apps
The emergency patches Microsoft plans to rush out on Tuesday will fix a flaw that runs through several critical Windows components and an unknown number of third-party applications, according to a pair of security researchers.

Best data loss prevention tools
Finding the right data loss prevention tool means striking a balance between speed, success rate at detecting and/or blocking sensitive data from exiting the network, and adequate coverage across a broad range of rule-sets and protocols.

Black Hat set to expose new attacks
The Black Hat conference unfolds in Las Vegas this week with an agenda set to expose exploits as varied as tapping power outlets to capture keyboard signals and closing up holes in the use of the secure protocol that protects online bank transactions.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Maintaining the Integrity of your CMDB through Change Detection
Learn how configuration drift can challenge configuration management database (CMDB) integrity and how a configuration audit tool and an effective change management process can help you keep your CMDB on course.
Get more information now.


 

July 27, 2009

TOP STORIES | MOST DUGG STORIES

  1. Tech tattoos: The good, the bad and the RU SRS?!
  2. Microsoft admits it can't stop Office file format hacks
  3. America's 10 most wanted botnets
  4. Hacker group L0pht makes a comeback, of sorts
  5. MIT electric car may rival gas models on performance
  6. How much longer are you going to hang onto that Ethernet cable?
  7. Apple takes legal heel off throat of wiki operator
  8. Microsoft's Linux madness has a method
  9. Microsoft stuns Linux world, submits source code for kernel
  10. Palm webOS gains enterprise features

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: