Search This Blog

Wednesday, March 10, 2010

More RSA identity management highlights

Microsoft patches Excel, XP, Vista, W7, Virtual PC; leaves others holes alone | Gov't accused of rushing through major, secret IT contracts

Network World Security: Identity Management Alert

Forward this to a Friend >>>


More RSA identity management highlights
Let's take a look at what else was happening at the RSA Security conference last week in addition to the announcements we noted in the last two newsletters. Read More


WEBCAST: ShoreTel

A Lower Cost Approach to UC
Learn about a switch-based architecture that provides the industry's lowest total cost of ownership while exploiting the full power of IP. See why this system beats the market leaders and has over 1 million users like Big Brothers/Big Sisters who candidly discuss their selection process, goals and ultimate success in moving to UC. Learn More!

WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Microsoft patches Excel, XP, Vista, W7, Virtual PC; leaves others holes alone
As part of Microsoft's regular Patch Tuesday schedule, the company released two patches that fix eight holds in Windows and Microsoft Office. Both holes have an overall rating of "important" but using another metric, its Exploitability Index, they have earned the highest rating of "1." This means that Microsoft Security believes that exploit code is not only likely, but that it can be created in... Read More

Gov't accused of rushing through major, secret IT contracts
The government is rushing to sign a spate of new IT contracts, totalling several billion pounds, ahead of an election, the Conservative party has claimed. Read More

FBI: Alleged extortionist wanted to cyber-bomb insurance company
Threatening e-mails, false public statements and spam were all part of a California man's cyber-extortion plan against the New York Life insurance company, according to the FBI. Read More


WHITE PAPER: Brocade

Q&A: Virtualization and Cloud Preparedness
As more applications are added per compute node in a virtual environment, there is a corresponding increase in I/O requirements. In this Q&A with Brocade CTO, Dave Stevens, he answers questions on how to ensure your network infrastructure, all the way down to the storage level, is ready for virtualization. Read More!

Online security questions are too easy to answer
Security questions that allow web users to access their online accounts if they forget their passwords, can easily be answered by hackers, says researchers at the University of Cambridge. Read More

Schneier: Fight for privacy or kiss it good-bye
If the public wants online privacy it had better fight now for laws to protect it because businesses won't and individuals don't have the clout, security expert Bruce Schneier told RSA Conference. Read More

Travelers file complaints over TSA body scanners
Documents obtained by the Electronic Privacy Information Center (EPIC) shows complaints have been lodged with the Transportation Security Administration (TSA) over the use of whole body scanners at U.S. airports. Read More


WHITE PAPER: Force10

Data Center Optimization Strategies
Enhance the efficiency of your data center by improving power and cooling. Learn the strategies you can use to refine power efficiency, thereby boosting your TCO and lowering your budget. Read More

Opera confirms critical browser bug
Opera Software yesterday confirmed a critical vulnerability in its Windows desktop browser, and said it is working on a patch. Read More

Phishers widen their net to target new businesses
Cybercriminals are expanding the types of organisations they exploit in phishing attacks, says the Anti-Phishing Working Group (APWG). Read More

Microsoft warns of new IE bug; attacks under way
Microsoft today warned of a critical vulnerability in Internet Explorer that is already being exploited by hackers, the second such admission in the last two months. Read More

US softens Internet export rules for Iran, Sudan and Cuba
Looking to facilitate what it calls free speech rights in countries that don't look favorably at such liberties, the US government today said it would ease the regulations around exporting Internet-based applications such as Read More

FTC: Identity thefts down, but fraud complaints up
Identity theft continues to lead the Federal Trade Commission's yearly look at consumer gripes but reports of the crime actually dropped 5% from 2008. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. FDIC: Hackers took more than $120M in three months
  2. Former NSA tech chief: 'I don't trust the cloud'
  3. Tech debate: Google Gmail vs. hosted Microsoft Exchange
  4. The state of 4G in 2010
  5. Microsoft delivers feature-rich SSL VPN
  6. A must read for IT professionals, legislators and law enforcement
  7. Time flies dept.: Dot-com craze peaked 10 years ago
  8. LTE speeds faster than expected in Verizon trials
  9. Pa., district accused of student spying puts IT workers on leave
  10. U.S. softens Internet export rules for Iran, Sudan and Cuba

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: