Monday, November 23, 2009

Courion cuts cost of provisioning systems

FCC: Internet program for deaf cheated out of millions of dollars; Cisco's free iPhone app grabs security feeds
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by McAfee
rule

Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.

Click here.

rule

Spotlight Story
Courion cuts cost of provisioning systems

Whenever I go through the archives from the early days of this newsletter (as I did for the last issue) I'm reminded of the day back in the fall of 1999 when I came across a small booth in the "start-ups alley" area of a trade show, which featured the new eProvisionware from Business Layers. In my mind that was the beginning of the identity management era. Read full story

Related News:

FCC: Internet program for deaf cheated out of millions of dollars
In court the Federal Communications Commission has charged 26 people with defrauding the agency of "tens of millions of dollars" from its program that lets people with hearing disabilities to communicate with hearing individuals through the use of interpreters and Web cameras. 

Cisco's free iPhone app grabs security feeds
Cisco has made available a free iPhone app that can be used to receive over a dozen security-related information feeds in customizable form related both to Cisco products and to general security topics, such as newly detected threats.

Three indicted for Comcast hack last year
Three hackers have been indicted for redirecting the Comcast.net Web site to a page of their own making in 2008.

Access control strategies for PCI and other security operations
Innovations in the access control solutions market have made it easier to align security and compliance objectives with business imperatives. Industry expert Cheryl Traverse talks about how next-generation access control solutions address very explicit requirements in the PCI DSS.

Cyberattacks on U.S. military jump sharply in 2009
Cyberattacks on the U.S. Department of Defense -- many of them coming from China -- have jumped sharply in 2009, a U.S. congressional committee reported Thursday.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Beefing up Email Security by Teaming with a Leader
Improve your email security practices after watching this Webcast. Your email security choices extend beyond on-premise only solutions. Improve your anti-spam, visibility, content filtering and encryption support with hosted, hybrid and managed email security services.
Click here to learn more.


3 Tips to Get Out of Firefighting Mode
Join Enterprise Management Associates (EMA) for this webcast on how to become more proactive with network and application management. EMA offers guidance on how to pick a pilot project to demonstrate immediate success as well as tips on how to lengthen MTBF and shorten MTTR.
Click here to get all the details now!

 

November 23, 2009

MOST-READ STORIES

  1. Microsoft Windows chief decries standards grandstanding
  2. The 5 best, and 5 worst, features of Google Chrome OS
  3. Federal government using PS3 to crack pedophile passwords
  4. 10G Ethernet cheat sheet
  5. Top 10 free Windows tools for IT pros, at a glance
  6. So you think you know Skype?
  7. NSA helped with Windows 7 development
  8. 3 basic steps to avoid joining a botnet
  9. Microsoft touts groundbreaking 'clip-on' for Active Directory
  10. FAA fixes computer glitch, delays remain

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.
Building a Successful Security Operations Center



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment