Tuesday, February 16, 2010

Identity wish list includes stronger authentication

Microsoft yanks patch causing XP PCs to crash | US sharpens intellectual property crime battleaxe

Network World Security: Identity Management Alert

Forward this to a Friend >>>


Identity wish list includes stronger authentication
I hope you had the opportunity to join me for the virtual identity conference last week. I hosted two great panels on Tuesday, and I'd like to talk about some of the issues they raised. Read More


WHITE PAPER: Trend Micro

Smarter Protection For the Enterprise
Read this IDC paper for background on today's threat ecosystem with an overview of network security threats, the impact of the threats on enterprises, and the operational challenges faced by IT. Learn more.

WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Microsoft yanks patch causing XP PCs to crash
Hundreds of users posted messages on a Microsoft support forum complaining that Patch Tuesday's updates were crashing their XP computers. Indeed, a couple of readers wrote to Microsoft Subnet about the problem, too. Microsoft responded on Thursday by removing the offending patch from its automatic download for consumers. However it did not remove the patch from its enterprise patch management systems.... Read More

US sharpens intellectual property crime battleaxe
After years of criticism, the Department of Justice today set up a task force it says will focus exclusively on battling US and international intellectual property crimes.  Read More


WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

Feds Change Cybersecurity Strategy -- Again
Yesterday the Office of Management and Budget (OMB)announced that it will no longer pursue the Trusted Internet Connect (TIC) initiative first announced in November 2007. TIC was considered one of the cybersecurity efforts making up the Comprehensive National Cybersecurity Initiative (CNCI) which was born out of National Security Presidential Directive (NSPD) 54 and Homeland Security Presidential... Read More

Microsoft guffaws at the severity of Black Hat Bitlocker/TMP hack
Microsoft on Friday downplayed the risk of using Trusted Platform Module chips after Black Hat researchers demonstrated a hack of them last week. Read More


WHITE PAPER: Brocade

Q&A: Virtualization and Cloud Preparedness
As more applications are added per compute node in a virtual environment, there is a corresponding increase in I/O requirements. In this Q&A with Brocade CTO, Dave Stevens, he answers questions on how to ensure your network infrastructure, all the way down to the storage level, is ready for virtualization. Read More!

Install software updates and security patches without rebooting
For server administrators, installing software updates and security patches is a critical part of the job. But it's also expensive and disruptive when a server must be rebooted to activate the update. A team of MIT engineers has developed technology that allows rebootless updates, and it's now available through a subscription service. Read More

Government and infrastructure tops hacking league
Cybercriminals are now aggressively targeting government and critical infrastructure companies, a review of malware and attack patterns over the last year has found. Read More

US airborne laser weapon blasts rocketing missile
The Airborne Laser Testbed is a, infrared, megawatt-class, high-energy Chemical Oxygen Iodine Laser (COIL) installed inside a modified Boeing 747-400F aircraft to detect, track and destroy ballistic missiles. Read More

Gov't builds secret database to fight cyber-terrorism
Australia's biggest banks, telcos, and utilities have handed sensitive data to government for the protection of critical infrastructure (CI) against terrorism and natural disasters. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

10 coolest experiments from Google Labs
When you've got thousands of the world's most brilliant engineers spending 20% of their time on whatever takes their fancy, cool software is the result.

7 social SharePoint apps built in a week
Seven startups competed to develop great SharePoint apps in one week.

MOST-READ STORIES

  1. IBM's Jeopardy-playing machine beats human contestants
  2. Winter Games: videogame your way through the Olympics
  3. 10 must-have Olympic iPhone apps
  4. U.S. government's 'enlightening' new cybersecurity weapon
  5. Microsoft warns of SSL/TLS vulnerabilities
  6. U.S. Internet security plan revamped
  7. 10 best IT jobs right now
  8. 10 recession-proof IT skills
  9. Windows patch cripples XP with blue screen, users claim
  10. Note to Cisco: Pick your security battle

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment