Search This Blog

Wednesday, February 10, 2010

New ways to approach identity management

Microsoft fixes 26 security holes, warns on unpatched multi-vendor SSL vulnerability | People May Be the Weakest Link in the Server Virtualization Chain

Network World Security: Identity Management Alert

Forward this to a Friend >>>


New ways to approach identity management
Recently I had the opportunity to chat with two of the more knowledgeable people in the Privileged User Management (PUM -- sometimes called Privileged Identity Management, PIM) space -- Phil Lieberman, CEO of Lieberman Software and Shlomi Dinoor, vice president of emerging technologies, Cyber-Ark Labs. Read More


WHITE PAPER: Palo Alto Networks

A Practical Guide to Web 2.0 Security
This guide to Web 2.0 security is based on analysis of network traffic in over 200 organizations collected over 6 months in 2009. It details how to deploy an effective firewall to handle applications like Skype and Sametime that are capable of transferring files or apps like WebEx that enable desktop sharing. Click here.

WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Microsoft fixes 26 security holes, warns on unpatched multi-vendor SSL vulnerability
As expected, today's Patch Tuesday is a doozie. Microsoft released 13 bulletins to fix 26 vulnerabilities in Windows and Microsoft Office. This includes the first Hyper-V-specific patch. But wait, there's more. Microsoft also issued a security advisory (977377) over a publicly-known vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. Read More

People May Be the Weakest Link in the Server Virtualization Chain
I participated in a webinar on virtualization last week, along with Extreme Networks and Microsoft. During the session, 113 audience members were asked two polling questions. Here are the questions and the results: 1. In your opinion, which of the following factors is holding your organization back from using server virtualization more prominently throughout the enterprise? 1. Lack of virtualization... Read More

Why antivirus software is slow
Even a bad AV technology can be valuable, because protection against, say, 30 percent of all threats is still a lot better than protection against 0 percent of all threats. Read More


WHITE PAPER: Trend Micro

Effectively Deal with Security Threats in Real-Time
Eliminate costly and time-consuming manual security processes with a network security overwatch layer. Raise the bar on security protection within your organization. Find out why an overwatch layer should be part of your best practice security requirements. Read now.

Keep Clear of Craigslist Scams
Given everything from the "Craigslist killer" to Connecticut attorney general Richard Blumenthal's campaign against the site to the escalating battle over prostitution ads, you'd have to live under a rock to miss Craigslist's sensational presence in the media. Lost in the discussions of illicit or criminal activity, though, are the everyday scams--and every category on the site has them. Read More

US National Climate Service to manage world of climate change
In announcing the intent to form a National Climate Service, the Commerce Dept. said the service will provide critical business and community planning information about climate changes. Read More

Ksplice debuts zero downtime service for Linux
Ksplice officially launched its no-reboot patching service for Linux servers. Read More


WEBCAST: Tripwire

Why Regulations Aren't Enough
The entities that create and enforce regulations do not know your business. That's why meeting compliance requirements such as SOX or HIPAA are just a starting point to securing your data. Hear security expert and author, Jennifer Bayuk, as she discusses best practices for IT security. Learn more.

Intel Atom netbooks get whole-disk encryption
Netbook users worried about storing sensitive data on their portables are being offered the world's first whole-disk encryption that will run useably on Intel's Atom processor. Read More

Websense debuts unified security architecture
Websense Tuesday announced Triton, a unified security architecture, which merges its data-loss prevention and e-mail security products, keeping much of the security-as-a-service approach it already supports, but with a common management and reporting console. Read More

More evidence of value of security certification
This is the second of five articles discussing the benefits (if any) of security certifications in the job market. In the first article, a number of studies suggested that certifications do indeed improve prospects for hiring and higher salaries. Read More

'Political hacktivism' surged in 2009, says report
Last year, the web saw a surge in 'political hactivism' or politically-motivated attacks on the internet, says McAfee. Read More

25% think retailers should be responsible for web security
A quarter of Brits think retailers should be responsible for making online shopping safer, says CyberSource. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

10 coolest experiments from Google Labs
When you've got thousands of the world's most brilliant engineers spending 20% of their time on whatever takes their fancy, cool software is the result.

7 social SharePoint apps built in a week
Seven startups competed to develop great SharePoint apps in one week.

MOST-READ STORIES

  1. How to make new stuff from your piles of obsolete tech
  2. Why your computer sucks
  3. 10 recession-proof IT skills
  4. Juniper execs share network vision
  5. 9-year-old plots his fifth Microsoft certification
  6. 10 best IT jobs right now
  7. Start-up links VMware with Amazon to create secure cloud storage
  8. YouTube worth watching
  9. Cisco to unleash data center extensions
  10. 61 CCIEs dropped out of Cisco's coveted cert program

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: