Wednesday, December 16, 2009

Microsoft's acquisition of Sentillion stands out

Google Chrome bug leaks IDs of anonymous surfers; 10 Predictions for 2010: Kaminsky and Weatherford
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Customers Share Their Experience with IBM Service Management
The IBM cloud computing infrastructure, Architecture and information management are designed to help you sustain ongoing cost reduction while improving service levels over the long term.

Learn More Now

rule

Spotlight Story
Microsoft's acquisition of Sentillion stands out

It took until December, but what could be the biggest acquisition story of the year broke last week. At least until Oracle's buyout of Sun gets EU approval, Microsoft's acquisition of Sentillion will be the big one. Read full story

Related News:

Google Chrome bug leaks IDs of anonymous surfers
A flaw in the Google Chrome web browser that could reveal the identity of web users trying to surf anonymously, has been identified.

10 Predictions for 2010: Kaminsky and Weatherford
Curious about what's going to happen to our critical IT infrastructure in 2010? Here, IT security luminaries Mark Weatherford, CISO for California State, and Dan Kaminsky, finder of last year's DNS flaw, offer five predictions each. (The first of 2 parts).

Hackers are defeating tough authentication, Gartner warns
Security measures such as one-time passwords and phone-based user authentication, considered among the most robust forms of security, are no longer enough to protect online banking transactions against fraud, a new report from research firm Gartner Inc. warns.

New laws complicate security efforts in 2010
Regulatory compliance will continue to influence security projects in 2010 as a slew of new security and privacy regulations go into effect, such as the federal HITECH Act.

Zero-day vulnerability threatens Adobe users
Adobe is investigating possible vulnerabilities in its Reader and Acrobat applications that could allow an attacker to execute malicious code on Windows machines and completely compromise them.

ActivIdentity acquires CoreStreet in $20 million deal
ActivIdentity has reached an agreement to acquire CoreStreet in a primarily cash deal worth about $20 million.

Supreme Court to Rule on Employee Privacy
The Supreme Court of the United States has agreed to hear a case related to the expectation of privacy in the workplace. The case in question involves public employees, but the decision could have consequences that reverberate to private organizations as well, and impact efforts to maintain regulatory compliance.

Today from the Subnet communities

On Cisco Subnet: Annual revenue for Cisco TelePresence and Cisco's EMC/VMware collaboration viewed favorably; On Microsoft Subnet: Power outages cause Windows Server 2008 problems; On Google Subnet: Google claims its new URL shortening service is more secure

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure.
Learn More


Achieve Data Warehousing Performance with a Column-Oriented Database
The growing demand for deep-dive data mining, complex event processing and strategic business analytics puts increased demands on today's data bases and data warehouse. Learn how an alternative data base approach, which begins by storing data by columns instead of rows, has proven to meet today's exploding data warehouses.
Read this Paper Now!

 

December 16, 2009

MOST-READ STORIES

  1. Watch out Microsoft: GNOME is poised to have a killer 2010
  2. Bank's antifraud tactics stun security expert
  3. Ethernet switch cheat sheet
  4. Supreme Court to consider texting-in-workplace case
  5. From the White House to Microsoft, open source shined in '09
  6. 8 PowerPoint train wrecks
  7. What Google phone does and doesn't mean for wireless industry
  8. Oracle's pledges on MySQL are 'purely cosmetic', say critics
  9. 10 top iPhone apps for IT pros
  10. Microsoft buys Opalis to strengthen cloud management

Lower the Cost and Complexity of a Mobile Workforce through Automation
To help you manage a mobile workforce and reduce cost and complexity through automation, Dell invites you to a session with Matt Healy, IDC's Research Manager. He will explore new and generally unaddressed challenges to IT, shortcomings of traditional methods of managing a distributed environment and factors to consider when purchasing automation.
View Now



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment