Search This Blog

Monday, March 22, 2010

Sailpoint offers new take on provisioning

IRS security faults leave taxpayer information at risk | Malware infected memory cards of 3,000 Vodafone mobiles

Network World Security: Identity Management

Forward this to a Friend >>>


Sailpoint offers new take on provisioning
I was going to open this issue with the phrase "the more things change, the more they stay the same" but I've used that a lot lately (which probably reflects more on our industry than it does on my thought processes). Instead, I'll say, "Everything old is new again." Read More


WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

WHITE PAPER: Arcsight

Combating Fraud & Data Theft
Discover scalable, minimally intrusive, log-based monitoring solutions optimized to the monitoring challenges unique to financial institutions. Learn More

IRS security faults leave taxpayer information at risk
In this the heavy tax season where billions of dollars and tons of personal information is relayed to and from the government, it's more disconcerting to hear that the Internal Revenue Service is still struggling to keep private information secure. Read More

Malware infected memory cards of 3,000 Vodafone mobiles
Malware-tainted memory cards may have ended up on as many as 3,000 HTC Magic phones, a greater number than first suspected, Vodafone said Friday. Read More

US to develop smart machines with visual intelligence
The Defense Advanced Research Projects Agency (DARPA) is set to develop a system that will let machines or robots have visual intelligence similar to humans.  Read More

A quarter of teens have tried hacking
A quarter of teens have attempted to hack into other people's online accounts, says Tufin Technologies. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Network Security Renaissance
ESG Research indicates that network security spending will be a focus area for 2010. Nearly half (48%) of midsized (i.e. less than 1,000 employees) and enterprise (i.e. more than 1,000 employees) will invest in network security technologies like firewalls, IDS/IPS, gateways, and threat management solutions. Yes, all of these technologies are important components of a defense-in-depth security architecture... Read More

Weak states leave EU open to cyberattack
EU states need to work far more closely with one another to have any chance of fending off the sort of cyberattacks that caused huge problems for Estonia in 2007, a House of Lords report has said. Read More

Google patches Chrome days before hacking contest
Google has patched 11 vulnerabilities in the Windows version of Chrome, including one that earned its finder the first $1,337 check from the company's new bug bounty program Read More

Judge approves Facebook's settlement offer in Beacon case
A federal judge has approved a proposed settlement by Facebook in a class-action lawsuit involving its now defunct Beacon behavioral tracking service. Read More


WHITE PAPER: HP ProCurve

Break Free from Proprietary Networking
See why Gartner and the network industry have positioned HP as a leader and the fastest-growing enterprise Ethernet LAN networking vendor. HP's commitment to industry-standards can help organizations optimize their network. Read now.

Spider email joker's website suspended
The website of infamous Internet prankster, David Thorne, has been suspended. Read More

Hackers offered $100,000 for browser and phone exploits
Security company 3Com TippingPoint has jacked up to $100,000 (£65,000) the prize money on offer to anyone able to hack a range of browsers and mobile devices at the forthcoming CanSecWest security conference. Read More

Two Madoff computer admins indicted
Two former computer administrators who worked for convicted financial fraudster Bernard Madoff's investment firm were indicted this week on charges of conspiracy and falsifying financial records. Read More

The FBI on Facebook: Watching every move you make
It seems 2010 may be the year personal privacy makes a comeback -- that, or it's taking its final breath before it sinks into the tarpits. Every week brings news of some new affront to our personal data, accompanied by a backlash. Lately these stories have been bubbling up on an almost daily basis. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Is this the year the proprietary CMS dies?
  2. Microsoft lowers Windows licensing costs for virtual desktops
  3. Top 12 tech knockoffs
  4. Windows XP: No IE9 for you
  5. Mobile developers take measure of Windows Phone 7
  6. Wireless router basics
  7. Comcast, ISC offer IPv6 transition tool
  8. New Cisco Ethernet switches to play a broader video, security roles
  9. Cisco defends its Borderless
  10. Doing the laptop drive of shame, Part III

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: