Wednesday, March 31, 2010

Directory service wish list still rings true

Network World Security: Identity Management - Newsletter - networkworld.com
Watchdogs join 'Net heavyweights in call for privacy law reform | NASA tapped to help Toyota acceleration investigation

Network World Security: Identity Management

Forward this to a Friend >>>


Directory service wish list still rings true
In our periodic look back to what was happening 10 years ago, it's always fascinating to see some of the same topics show up that are in the forefront of our discussions today. The newsletters from March 2000 are no exception. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

WHITE PAPER: PC Mall

Server Virtualization: Breaking Performance Barriers
Server virtualization reduces cost, increases availability and enhances business agility. But for many companies, a focus only on cost reduction can become a problem. Download this HP white paper to learn how to reap virtualization's additional benefits, including built-in, cost-effective high availability & disaster recovery. Learn More

Watchdogs join 'Net heavyweights in call for privacy law reform
They are in some cases strange bedfellows, yet they are lending their names and political muscle to a common cause today: updating U.S. privacy laws that predate the World Wide Web. Read More

NASA tapped to help Toyota acceleration investigation
If you want to solve a major engineering mystery why not bring in some of the world's best engineers? Read More

Managing iPad Security Weaknesses
Apple is like the Disney of technology--always adding a dash of "magic" to its products. Apple has an established base of dedicated fans of the user experience on its various Mac OS X products, and it has had the Midas touch when it comes to portable devices like the iPod, and the iPhone. However, Apple still needs to come up with a spell that wards off evil spirits. Read More


WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

Tech Secrets: 21 Things 'They' Don't Want You to Know
Yes, the truth is out there. But they don't want you to know about it. Read More

FAA boosts cybersecurity with help from IBM
The Federal Aviation Administration is teaming with IBM to build a prototype security system that will improve defense against cyberattacks on the nation's civilian aviation network. Read More

JC Penney tried to block publication of data breach
Retailer JC Penney fought to keep its name secret during court proceedings related to the largest breach of credit card data on record, according to documents unsealed on Monday. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

Windows users patch fast when zero-day hype heats up
A researcher says media coverage is a key reason why users patch zero-day Microsoft bugs faster, whether they are part of a standard patch Tuesday release or an out-of-band update. Read More

Security Lessons Learned from Pwn2Own Contest
The CanSecWest security conference is going on this week in Vancouver. Part of the CanSecWest conference is the annual Pwn2Own contest where security researchers show off their hacking expertise and compete to exploit and compromise fully-patched systems--a challenge the security researchers seem to overcome with surprising ease year after year. Read More

A CSO's guide to getting to "Yes"
The meeting was proceeding well. The client we were advising had assembled a team from across IT: systems, applications, network, storage… "Where is security?", we asked. "We didn't invite them – they just say no to everything and slow the meeting down. We'll pass the proposal by them later". Read More

Apple releases security update for Leopard, Snow Leopard
In addition to rolling out an update to Mac OS X 10.6 on Monday, Apple also issued a security update for users of its operating system. Security Update 2010-002 is included with the Mac OS X 10.6.3 update; Leopard users can download the update separately for client and server versions of Mac OS X 10.5. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. CEO payday: What tech's top execs made in '09
  2. Microsoft to patch IE zero-day with emergency fix Tuesday
  3. Apple now shipping iPads
  4. Video surveillance deployed inside London public bathrooms
  5. N.Y. man sues McAfee over antivirus auto-renewal fees
  6. Sprint readies big internal announcement?
  7. Is Cisco 'too big to fail?'
  8. Yahoo proposes 'really ugly hack' to DNS
  9. Microsoft defends Windows 7 security after Pwn20wn hacks
  10. IT managers could avoid grief by curtailing admin rights in Windows

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment