Search This Blog

Wednesday, January 20, 2010

Identity issues for 2010, Part 3

Windows 7 troubles and business continuity | Hackers hit Network Solutions customers

Network World Security: Identity Management Alert

Forward this to a Friend >>>


Identity issues for 2010, Part 3
Today we'll wind up the predictions for the coming year that have come to me from pundits and thought leaders in the IdM industry. Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: Quest Software

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure. Learn More

Windows 7 troubles and business continuity
Do you ever simultaneously feel like an idiot and also grateful that you've done at least something – anything – right? Read More

Hackers hit Network Solutions customers
Hackers have managed to deface several hundred Web sites hosted by Network Solutions, the company said Tuesday. Read More


WHITE PAPER: Zscaler

How Hackers are Targeting Enterprise Users via Web 2.0 Browser Exploits
Securing enterprise servers with firewalls and intrusion detection is critical, but the most common threats are executed on thousands of mobile end users through the Web. Lean how to protect your clients with more than desktop anti-virus/anti-spyware and HIPS. Learn more!

Apple patches 12 Mac bugs in Flash, SSL
Apple on Tuesday patched 12 vulnerabilities in Leopard and Snow Leopard, including seven in Adobe Flash Player and one in the protocol used to secure Internet traffic. Read More

Security researcher IDs China link in Google hack
The malicious software used to steal information from companies such as Google contains code that links it to China, a security researcher said Tuesday Read More


WHITE PAPER: Trend Micro

Smarter Protection For the Enterprise
Read this IDC paper for background on today's threat ecosystem with an overview of network security threats, the impact of the threats on enterprises, and the operational challenges faced by IT. Learn more.

Identity theft on the rise
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More

Brain drain; admin failures threaten FCC role
The Federal Communications Commission has brain drain and administration problems that could decrease its effectiveness at a time when advanced service technologies such as wireless and broadband present significant regulatory challenges. Read More

IC3 includes identity theft in statistics
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More

Microsoft Promises Early Patch for IE Zero-Day
Microsoft announced that it will release an out-of-band patch--meaning a patch that breaks the standard Patch Tuesday release cycle--to address the Internet Explorer flaw at the heart of the attacks in China against Google and other targets. The announcement was short on details, but Microsoft promised to provide more information on Wednesday. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco's borderless networking: the next big thing? On Microsoft Subnet: FreeNAS: Open Source Network Attached Storage; On Google Subnet Top 10 Open Source Rookies of the Year.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: