Wednesday, January 13, 2010

More Identity issues for 2010

Microsoft DirectAccess: The ugly truth | DARPA's massive cyber security project awards $56 million for research

Security: Identity Management Alert

Forward this to a Friend >>>


More Identity issues for 2010
Today we'll get back to predictions for 2010 as offered to me by some of the leading lights of the IdM universe. You'll remember (I hope) that two issues ago we looked at predictions for identity and cloud computing, the most popular topic from my correspondents. The next most popular topic was mergers and acquisitions, with some surprising answers. Read More


SPONSOR: HP

IDC: Minimize Downtime, Mitigate Risk
IDC research shows that SMBs can experience an average loss of revenue of $70,000 per downtime hour. Assess internal and external risks, understand revenue impact, and learn how well-targeted technology initiatives such as management tools, server upgrades, failover clustering and thin clients can help you to respond to disruptions effectively and affordably. Read Now.

SPONSOR: ITnews

Get the new ITnews iPhone App
Access up-to-the-minute, award-winning technology news from well known and respected IDG tech sites all in one place. Receive breaking tech news push notifications, view stories by Tag Cloud, and more. Download it now>>

Microsoft DirectAccess: The ugly truth
The seamless secure remote access built into Windows 7 and Windows Server 2008 R2 is fantastic, if you don't mind a forklift upgrade or complexity and work-arounds Read More

DARPA's massive cyber security project awards $56 million for research
Researchers at the Defense Advanced Research Projects Agency (DARPA) today awarded almost $56 million to two contractors it expects will develop the second phase of technologies that it promises will be revolutionary and bolster current cyber security technology by orders of magnitude. DARPA spent $30 million to develop Phase 1. Read More


SPONSOR: Zscaler

How Hackers are Targeting Enterprise Users via Web 2.0 Browser Exploits
Securing enterprise servers with firewalls and intrusion detection is critical, but the most common threats are executed on thousands of mobile end users through the Web. Lean how to protect your clients with more than desktop anti-virus/anti-spyware and HIPS. Learn more!

Banking malware found in Google Android Market
Mobile phone owners with handsets running Google's Android OS, such as the HTC Hero, could be at risk from cybercriminals trying to steal their bank account information. Read More

Anti-theft chip turns laptop into 'brick'
Absolute Software has added a new feature to its Computrace Lojack anti-theft software that can remotely turn a stolen laptop into a useless, non-bootable 'brick'. Read More


SPONSOR: SUN

Enabling HIPAA/HITECH Compliance
As healthcare organizations and vendors become more reliant on digital information, complying with increasing regulatory requirements presents challenges. This paper explores the requirements, best practices for implementing identity management systems that help ensure compliance, and Sun's simplified approach. Learn More

Maryland aims to be cybersecurity 'epicenter'
Maryland officials want the state to be the U.S. "epicenter" for fighting cyber attacks, and on Monday they launched an effort to bring more cybersecurity research and jobs to the state. Read More

Fishy Android apps may have been malware, says researcher
Suspicious applications that may have stolen users' online banking credentials have appeared on the Android Market, the Google-run app store for its mobile operating system. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database.

Network World on Twitter? You bet we are

Ethernet everywhere Decade in tech
Here is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.




Windows 7Cool Yule Tools
Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.




MOST-READ STORIES

  1. Microsoft apologizes for software validation snafu
  2. Half of all data centers understaffed, Symantec survey finds
  3. 2010's 25 geekiest 25th anniversaries
  4. Outlook 2010
  5. Microsoft admits mobile missteps, but fights on
  6. Where Nortel is now
  7. Newcomer offers free Cisco router management software
  8. Next-gen iPhone to include significant camera improvements
  9. Chrome sets browser security standard, says expert
  10. ISP operators among 19 arrested in cyber-fraud case

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment