Search This Blog

Wednesday, October 21, 2009

Oracle tackles identity mgmt.

FTC slams MoneyGram with $18M charge to settle fraud complaints; Security software protects mobile and remote Mac, Windows users
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Data Domain
rule

VMware Data Backup and Recovery Best Practices
VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources and administrative challenges. Data Domain deduplication storage offers a way out by reducing redundant data across VMware data backups, operating at disk speeds, and providing cost-effective replication for fast DR using backup images.

Click here to learn more.

rule

Spotlight Story
Oracle tackles identity mgmt.

I didn't go to Oracle Open World last week even though it happened just 45 miles from my office. While Oracle is very important in the IdM space, IdM isn't quite as important in the Oracle client-space -- there are a lot more people interested in the database, the financial applications, the ERP and so on. Still, there were announcements that are important to us so I would be remiss in overlooking them. Read full story

Related News:

FTC slams MoneyGram with $18M charge to settle fraud complaints
This place sounds like scam central. The second-largest money transfer service in the United States, MoneyGram International today agreed to pay $18 million in consumer redress to settle FTC charges that the company allowed its money transfer system to be used by fraudulent telemarketers to bilk U.S. consumers out of tens of millions of dollars. 

Security software protects mobile and remote Mac, Windows users
DeepNines Technologies Tuesday is unveiling a desktop security agent that works in tandem with its content-filtering and anti-malware gateway to protect mobile and remote workers.

Iconix settles charges of violating children's privacy law
Iconix Brand Group, which sells clothing for children and teens under several brands, will pay a US $250,000 civil penalty to settle U.S. Federal Trade Commission charges that it violated a law prohibiting companies from collecting and using children's personal information without parental permission.

Survey: Americans don't trust the cloud to store confidential data
Americans don't trust cloud storage for their confidential data, with identity theft ranking as their top security concern.

Mozilla blocks Microsoft's sneaky Firefox plug-in
Mozilla has blocked the Microsoft-made software -- an add-on dubbed ".NET Framework Assistant" and a plug-in named "Windows Presentation Foundation" -- that had put Firefox users at risk from attack.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Web Application Security without Compromise
Web applications are vulnerable in custom application logic, the underlying software platform as well as Web services. Learn how to protect your network against application-level attacks such as SQL injection, cross-site scripting and worm infections.
Click here to learn more.


Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now

 

October 21, 2009

MOST-READ STORIES

  1. Verizon fires shots across iPhone's bow with Droid smartphone
  2. Smartphone smackdown: Motorola Droid vs. iPhone 3GS
  3. What the heck are you doing on the Internet at that hour?
  4. Ballmer: Sidekick outage 'not good'
  5. Secrets of successful data centers
  6. 10 things you need to know about Windows 7
  7. Ethernet everywhere!
  8. Hoax of the day: U.S. Chamber backs "strong" climate bill (not)
  9. Mozilla blocks Microsoft's sneaky Firefox plug-in
  10. Symantec calls 'SpywareGuard', 'Antivirus' top scareware threats

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: