Search This Blog

Wednesday, January 06, 2010

Identity issues for 2010

Predictions: Security Threats for 2010; 2010 tech forecasts: What the accurate analysts predict
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by WatchGuard
rule

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.

Click here.

rule

Spotlight Story
Identity issues for 2010

A belated Happy New Year to you all, and let's hope it's a better one that 2009. But what can we look forward to in the coming year? I posed that question to a number of people in the IdM industry and over the next few issues we'll look at what they had to say. Read full story

Related News:

Predictions: Security Threats for 2010
To kick off the new year we present our 2010 Prediction Podcasts with a discussion around what types of security threats to expect in 2010. Patrik Runald from Websense gives us eight predictions of what to expect in the year, including threats like malvertising, SEO poisoning and botnet gang turf wars. (18:46)

2010 tech forecasts: What the accurate analysts predict
New-year predictions are often iffy, but these firms were pretty accurate in their 2009 calls. Will they be right again?

DARPA kick-starts flying car program
Military scientists are looking to ramp up research and development of a flying military vehicle that will hold up to 4 people and have the ability to launch vertically and soar when necessary.

Kingston owns up to USB stick hack
Independent memory giant Kingston Technology has issued a highly unusual warning that several of its supposedly secure encrypted USB drives can be hacked.

Make Your New PC Hassle-Free, Part 3: Keep It Secure
Did you find a new PC under the tree (or menorah) last month? If so, there are steps you should take to make it as hassle-free as possible

FBI issues code cracker challenge
The FBI today posted a pictogram on its site and challenged code crackers to solve its mysteries. In the bureau's challenge it is using pictogram symbols based on Native American motifs. The challenge offers over 50 words to decipher. Layer 8 Extra: 15 genius algorithms that aren't boring

New regulations will soon swell IT workloads
Government's response to the financial meltdown will require major tech initiatives for compliance, despite the recession's cutbacks

Why traditional security doesn't work for SOA
SOA's strengths turn out to be highly exploitable entry points for attackers

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database.

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

802.11n Drives an Architectural Evolution
The sharp capacity increase possible with 802.11n is a compelling force behind the evolution in WLAN architectures. This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Learn more


Shifting Role of Network Managers
Webcast - More and more network managers are tasked with ensuring optimal application performance 24/7. No one wants to be in a position where end users are the first to notice application degradation. This webcast addresses the shifting role of network managers and provides best practices on fault and performance management.
View today!

 

January 06, 2010

MOST-READ STORIES

  1. 2020 vision: Why you won't recognize the 'Net in 10 years
  2. Facebook blocks 'Web 2.0 Suicide Machine'
  3. 10 fool-proof predictions for the Internet in 2020
  4. 21 apps Apple doesn't want on your iPhone
  5. Microsoft rebels
  6. Giving Cisco a makeover
  7. What wins in the enterprise, the BlackBerry or the iPhone?
  8. Outlook 2010 IT skills checklist
  9. 10 start-ups to watch in 2010
  10. Maybe AT&T really should limit iPhone sales

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2010

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: