Search This Blog

Wednesday, March 17, 2010

Will Google Tip the Scale Toward OpenID?

US military plotted revenge on Wikileaks | McAfee scans cloud environments for security vulnerabilities

Network World Security

Forward this to a Friend >>>


Will Google Tip the Scale Toward OpenID?
Last week, Google announced that it will support OpenID as a Single Sign-On (SSO) and identity standard in its Apps Marketplace. For the most part, this announcement flew under the radar of most people but it may be far more significant than a simple technology integration play for several reasons: 1. OpenID is an industry standard with good but not great support. With Google's muscle, OpenID... Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

US military plotted revenge on Wikileaks
The US military was so fearful of classified information ending up on Wikileaks it considered ways to undermine the organisation, a newly published secret report on the site appears to show. Read More

McAfee scans cloud environments for security vulnerabilities
McAfee's new vulnerability-assessment scanning service is aimed at giving cloud-computing service providers a way to provide security assurances to their customers. Read More

Six Long-awaited satellite projects eye the sky
Hot satellites to beam superior GPS, communications bandwidth Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Learn More

Indian security startup offers free software
Wep Solutions, an Indian security software and services startup, is offering its unified threat management appliance software free to small businesses around the world. Read More

Lib Dems back down on Internet filtering
According to a report on the Guardian website, Lib Dem peers are preparing to alter their amendment to the Digital Economy Bill, which passed its second reading in the House of Lords last week. Read More

Why is cloud computing hard? Top tech execs speak their minds
Everyone's talking about cloud computing and security. But what makes it so hard? Execs at Microsoft, Trend Micro, EMC's RSA division, McAfee and Symantec tackle the question. Read More


WHITE PAPER: Compuware

5 Tips for Getting the Best Web App Performanc
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

60% of virtual servers less secure than physical machines, Gartner says
Sixty percent of virtual servers are less secure than the physical servers they place, the analyst firm Gartner said in new research Monday. Read More

Hackers lock Zeus crimeware kit with Windows-like anti-piracy tech
The newest version of Zeus, a do-it-yourself crimeware kit responsible for millions of dollars in losses by consumers and businesses, comes with anti-piracy provisions similar to those used by Microsoft's Windows, a researcher said today. Read More

The Rise of Free -- and Fake -- Antivirus Software
With the tremendous growth in malware. identity theft, and on-line scams, you'd think that every PC owner in the world would make Internet security software a "must have" before connecting to the Internet. Unfortunately, this assumption is dead wrong. Believe it or not, lots of industry research indicates two huge misconceptions still exist: 1. Many users believe that all of the public media... Read More

Slainte! Five St. Patricks Day apps for your iPhone
Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. 60% of virtual servers less secure than physical machines
  2. A new take on cloud security ... from Hitler
  3. FBI details most difficult Internet scams
  4. Chambers: 'I did not want to compete against IBM and HP'
  5. Apple EU stores closed - iPad UK price and pre-orders today
  6. Facebook's most wanted
  7. Bethesda unveils fantasy game Hunted: The Demon's Forge
  8. Microsoft: No native code for Windows Phone 7
  9. FCC's broadband plan: $15.5 billion for deployment
  10. Google launches Street View in Hong Kong and Macau

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: