Wednesday, March 17, 2010

Open source SSO lands in spotlight

Will Google Tip the Scale Toward OpenID? | Indian security startup offers free software

Network World Security: Identity Management Alert

Forward this to a Friend >>>


Open source SSO lands in spotlight
Last week was a really big week -- perhaps the biggest ever -- for open source simplified signon in general and OpenID in particular. Read More


WHITE PAPER: WatchGuard

When Pressing "Send" Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Learn more now.

WHITE PAPER: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

Will Google Tip the Scale Toward OpenID?
Last week, Google announced that it will support OpenID as a Single Sign-On (SSO) and identity standard in its Apps Marketplace. For the most part, this announcement flew under the radar of most people but it may be far more significant than a simple technology integration play for several reasons: 1. OpenID is an industry standard with good but not great support. With Google's muscle, OpenID... Read More

Indian security startup offers free software
Wep Solutions, an Indian security software and services startup, is offering its unified threat management appliance software free to small businesses around the world. Read More

US military plotted revenge on Wikileaks
The US military was so fearful of classified information ending up on Wikileaks it considered ways to undermine the organisation, a newly published secret report on the site appears to show. Read More


WEBCAST: Actuate

Discover BIRT.
Understand how BIRT simplifies and speeds to market the development of rich information applications. In this presentation, a technical expert behind BIRT will demonstrate a customer-facing application in action with Flash, Ajax, and JavaScript interactivity. Click Here!

Six Long-awaited satellite projects eye the sky
Hot satellites to beam superior GPS, communications bandwidth Read More

McAfee scans cloud environments for security vulnerabilities
McAfee's new vulnerability-assessment scanning service is aimed at giving cloud-computing service providers a way to provide security assurances to their customers. Read More

FBI: Cyberfraud losses doubled in 2009
Last year was a tough one for most businesses, but for cybercriminals it was one of the best yet. Read More


WEBCAST: ShoreTel

A Lower Cost Approach to UC
Learn about a switch-based architecture that provides the industry's lowest total cost of ownership while exploiting the full power of IP. See why this system beats the market leaders and has over 1 million users like Big Brothers/Big Sisters who candidly discuss their selection process, goals and ultimate success in moving to UC. Learn More!

Hackers lock Zeus crimeware kit with Windows-like anti-piracy tech
The newest version of Zeus, a do-it-yourself crimeware kit responsible for millions of dollars in losses by consumers and businesses, comes with anti-piracy provisions similar to those used by Microsoft's Windows, a researcher said today. Read More

60% of virtual servers less secure than physical machines, Gartner says
Sixty percent of virtual servers are less secure than the physical servers they place, the analyst firm Gartner said in new research Monday. Read More

Humans continue to be 'weak link' in data security
Nearly 90 percent of IT workers in the UK have said a laptop in their organisation has been reported lost or stolen, new research has found. Read More

Security group preps IT shops to ask vendors 'nasty questions'
The Jericho Forum, which advocates improving e-commerce security through knowledge that network perimeters are fading, says organizations need to ask themselves and their vendors tougher questions. Read More

Slainte! Five St. Patricks Day apps for your iPhone
Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. 60% of virtual servers less secure than physical machines
  2. A new take on cloud security ... from Hitler
  3. FBI details most difficult Internet scams
  4. Chambers: 'I did not want to compete against IBM and HP'
  5. Apple EU stores closed - iPad UK price and pre-orders today
  6. Facebook's most wanted
  7. Bethesda unveils fantasy game Hunted: The Demon's Forge
  8. Microsoft: No native code for Windows Phone 7
  9. FCC's broadband plan: $15.5 billion for deployment
  10. Google launches Street View in Hong Kong and Macau

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment