Search This Blog

Monday, February 01, 2010

The 'game' of identity

Cisco Security Quick Tip of the Week | Venerable B-52 bomber gets network centric

Network World Security: Identity Management Alert

Forward this to a Friend >>>


The 'game' of identity
Back in the day when personal computers where starting to become commonplace, the various machines (Commodore VIC-20, Atari, TRS-80, Apple I and others) each had its own operating system. Software could only run on one machine, which meant there were few choices and high prices. But what they all had was built-in BASIC, the programming language. Most had a BASIC interpreter, but the IBM PC came with a BASIC compiler (showing, I guess, that it was intended for bigger and better things). Read More


WHITE PAPER: WatchGuard

Avoid Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

Cisco Security Quick Tip of the Week
Jamey Heary: Did you know that Cisco switches come with the ability to perform web authentication at each switch port? Most people don't realize that this feature exists in Cisco IOS so I figured it would be a good Security Quick Tip. Read More

Venerable B-52 bomber gets network centric
One would guess that when its designers saw their first B-52 fly in 1954, they never envisioned nor worried about it being part of network centric warfare.  They might not have guessed the B-52 woul Read More


WHITE PAPER: Trend Micro

Effectively Deal with Security Threats in Real-Time
Eliminate costly and time-consuming manual security processes with a network security overwatch layer. Raise the bar on security protection within your organization. Find out why an overwatch layer should be part of your best practice security requirements. Read now.

Text-and-Drive Bans Don't Matter, Study Finds
Talking on the phone is so 20th century -- texting is where it's at. And that's why loads of drivers take to the great open road smooshing their QWERTY with nimble thumbs. That sounds like the worst idea I've ever heard, and the U.S. government (mostly) agrees. As of January 2010, 19 states along with Washington, D.C., have banned texting while driving. But now the Highway Loss Data Institute (HLDI) -- a project sponsored by insurance companies, of all entities -- claims that despite anti-texting-while-driving laws, crash rates are not affected. Wait, what? Read More

US House leaders ask for investigation into hackings
Two lawmakers criticized the Web services company that may have enabled the hacking of almost 50 government Web sites on Wednesday. Read More


WEBCAST: Sybase

op 5 Best Practices for Managing Mobility
The mobile world today is similar to that of the personal computer world of the early 1980s: it is begging for IT management to ensure a productive and secure user experience. This Webcast offers practical, immediately usable best practices designed to get IT started on the road to comprehensive mobile management and security. View Now

FBI arrests alleged cable modem hacker
U.S. federal authorities arrested a 26-year-old man on Thursday for allegedly selling modified cable modems that enabled free Internet access, according to the U.S. Department of Justice. Read More

EFF: Browsers can leave a unique trail on the Web
The Electronic Frontier Foundation has created an on-line tool that details the wealth of information a Web browser reveals, which can pose privacy concerns when used to profile users. Read More

Consolidate your security services infrastructure onto one scalable virtual platform
In the server consolidation wave, one area that is ripe for consolidation is security services. Today's security service infrastructure is primarily built on appliances, which have a way of proliferating like bunnies. What if you could take 800 Cisco firewalls and their incumbent networking infrastructure and collapse them down to one highly scalable virtual security platform? No problem. Read on to learn how. Read More

DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors
Massive denial-of-service attacks and infiltration of corporate networks by attackers is a common experience for companies in critical infrastructure sectors, including financial services, energy, water, transportation and telecom. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

12 years of big-time Apple innovations
From the iMac to the iPad, here are the biggest releases of the second Steve Jobs era.

10 Gigabit data center switch shootout
We tested six top-of-rack data center switches 10 ways to Sunday.

MOST-READ STORIES

  1. 'WiMAX 2' coming in 2011?
  2. Brocade BCNE most valuable cert on earth
  3. NSF earmarks $30M for game-changing Internet research
  4. Apple iPad could give Microsoft fits
  5. IBM, researchers to develop controversial lithium air battery
  6. Worst cities to work in IT: International edition
  7. Did Apple's iPad debut put a choke-hold on the Internet?
  8. 10 great iPhone apps for business users, at a glance
  9. Facebook and Twitter? Why not just put a gun to your head?
  10. iPad data demands could cripple AT&T 3G

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: