Search This Blog

Monday, September 21, 2009

A small conference with big offerings

Sniffing Your Windows Server Network; Apple flubs its improved support for Exchange email security
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Courion Corporation
rule

White Paper: Integrating Security and Identity
Download this white paper by Jon Oltsik, Principal Analyst at Enterprise Strategy Group (ESG) explaining how RSA, The Security Division of EMC, and Courion integrate their best-of-breed identity and security technologies in order to meet the changing needs of demanding enterprise customers.

Click to continue

rule

Spotlight Story
A small conference with big offerings

Last week was the bi-annual European version of The Experts Conference put on by Quest Software following their acquisition of NetPro last year. This was my first conference since the acquisition and since the previously yclept Directory Experts Conference had been renamed The Experts Conference (this spring) and a second track about Microsoft Exchange had been added to the original identity track (actually, it was originally simply about Active Directory). Read full story

Related News:

Sniffing Your Windows Server Network
In my Server 2008 class this week, a student ran into a situation where rebooting a domain controller seemed to take forever. (Sound familiar?) In a domain consisting of three, count 'em three, computers, it seemed ridiculous that the domain controller should require nearly 15 minutes to "prepare network connections." I was very curious to know what the heck was going on under the hood. Read...

Apple flubs its improved support for Exchange email security
Apple's improved support for Microsoft Exchange security triggers frustration for some enterprise users linking to Exchange 2007.

Man gets 15 months for E-Trade skimming scam
A California man was sentenced to 15 months in prison on Thursday after he pleaded guilty to opening tens of thousands of bogus online brokerage accounts and then pocketing the tiny test deposits made by companies like E-Trade Financial and Charles Schwab.

Best practices and automation for data privacy
Your organization probably pays attention to data security, ensuring that sensitive data doesn't leak out or get into the wrong hands. But what about data privacy? How can you ensure that your organization is adequately protecting an individual's right to control the way you use his personal data? Now there's a tool to help automate privacy compliance as part of your overall corporate GRC program.

Will security concerns darken Google's government cloud?
When Google launches its cloud computing services for federal government agencies next year, one of its biggest challenges will be to overcome concerns related to data privacy and security in cloud environments.

Curious George's latest mischief: malware
The Public Broadcasting System's Web site has been infected at a section related to the Curious George children's TV show and when the fake authentication page doesn't work for the user, tries to drop malware on them, researchers said Thursday.

FCC pledges public safety spectrum plan by February
Federal Communications Chairman Julius Genachowski told Congress today that a new plan for auctioning off part of the 700Mhz spectrum band for public safety would come by this coming February.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

White Paper: Integrating Security and Identity
Download this white paper by Jon Oltsik, Principal Analyst at Enterprise Strategy Group (ESG) explaining how RSA, The Security Division of EMC, and Courion integrate their best-of-breed identity and security technologies in order to meet the changing needs of demanding enterprise customers.
Click to continue


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 21, 2009

MOST-READ STORIES

  1. Microsoft's CodePlex Foundation has credibility issues already
  2. 10G Ethernet shakes net design to the core
  3. An amazing laptop recovery story
  4. Microsoft Internet Explorer SSL security hole lingers
  5. Skype Founders sue eBay: What's going on?
  6. 10 cool Web apps developed in two days
  7. 10 in IPv6 does not equal 10 in IPv4
  8. Nortel users should hope for best, prepare for worst
  9. Curious George's latest mischief: malware
  10. Cisco forms smart grid ecosystems

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: