Monday, March 08, 2010

Microsoft unwraps U Prove privacy protection

Microsoft delivers feature-rich SSL-VPN | Energizer Bunny's software infects PCs

Network World Security: Identity Management Alert

Forward this to a Friend >>>


Microsoft unwraps U Prove privacy protection
Two years ago, when Microsoft acquired Credentica and the technology called "U-Prove" (which uses cryptography and multi-party privacy features to facilitate "minimal disclosure" so a user can reveal only the bits of information about themselves they want to while protecting their privacy) Kim Cameron Microsoft's Identity Architect Kim Cameron promised that it would be made available for all platforms. Read More


WHITE PAPER: WatchGuard

WatchGuard's Top Ten Threats to Watch in 2010
For a no-nonsense view on the most likely threats you will face in the coming year, read this white paper. Our very best resident security expert lays out the ten vectors of data compromise he expects will be the biggest threats in 2010. Learn more now.

E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

Microsoft delivers feature-rich SSL-VPN
We tested Whale Communications' SSL VPN back in 2003 and the product didn't fare very well. Microsoft bought Whale in 2006, jettisoned some of the strange idiosyncracies of the product, dramatically simplified management, and subsequently integrated several Vista and Windows 7 technologies. Read More

Energizer Bunny's software infects PCs
The Energizer Bunny infects PCs with backdoor malware, the Department of Homeland Security's US-CERT said. Read More


WHITE PAPER: Symmetricom

Enterprise Network Time Synchronization Made Easy
This white paper explores various operational areas of network time servers and the EASY aspects that you should expect when you deploy them. This paper tells you why you need accurate, secure and reliable time and what to look for in a network time server for easy set-up and maintenance. Learn More

IBM looks to pair security technologies for software development
Former Watchfire and Ounce Labs capabilities would be partnered in an enterprise-level product to be released later this year Read More

When it comes to online, in seals we trust
Gibbs ponders why we trust and what impact a certification might have then looks at why ControlScan got in trouble with the FTC Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

PCI DSS logging: A must for compliance
The PCI DSS continues its march from the largest to the smallest merchants, affecting the way thousands of organizations approach security. PCI DSS applies to all organizations that handle credit-card transactions or that store or process payment-card data. Read More

FBI Director: Hackers have corrupted valuable data
Hackers breaking into businesses and government agencies with targeted attacks have not only stolen intellectual property, in some cases they have corrupted data too, the head of the U.S. Federal Bureau of Investigation said Thursday. Read More

Lose the Trojan
Deb asked the Answer Line forum how she can remove a Trojan from an infected .dll file called infamiqayoq.dll. Her security software quarantined the file, but now she gets an error message every time she boots. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

7 most useful Firefox add-ons
Some "add-on apps" work well enough to replace a standalone desktop application. Here are seven add-ons that transform Firefox into a fully functioning application.

Fave raves: IT pros' favorite products
We asked readers about their favorite must-have network products and found there's a lot of love for products that can automate manual processes, improve visibility and management, and speed performance for end users. Products that save money are also, not surprisingly, big favorites.

MOST-READ STORIES

  1. Report: North Korea develops own Linux distribution
  2. Researchers find way to zap RSA security scheme
  3. 19 weird but real gadgets and gizmos
  4. Former NSA tech chief: I don't trust the cloud
  5. The man behind Microsoft's Windows Phone design
  6. More speculation on Cisco's March 9 announcement
  7. Sony takes aim at Apple iPhone, iPad and iTunes
  8. New exploit technique nullifies major Windows defense
  9. Ten of the world's strangest social networks
  10. Q&A: Verizon's LTE road map for 2010 and beyond

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment