Search This Blog

Wednesday, April 07, 2010

Document offers gloomy view of cloud

Researchers track cyber-espionage ring to China | Google Hits Restart on Buzz Privacy Settings

Network World Security: Identity Management

Forward this to a Friend >>>


Document offers gloomy view of cloud
The Office of the Privacy Commissioner of Canada recently published a document about cloud computing titled "Reaching for the Cloud(s): Privacy Issues related to Cloud Computing." I didn't like this document at all. Read More


WHITE PAPER: Cisco Systems Inc.

Improve Productivity by Optimizing your SSL VPN
Are you getting all you can from your SSL VPN? Read this whitepaper to find out Learn More

WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

Researchers track cyber-espionage ring to China
Researchers in the U.S. and Canada have tracked and documented a sophisticated cyber-espionage network based in China, dubbed Shadow, that targeted computers in several countries, including systems belonging to the Indian government and military. Read More

Google Hits Restart on Buzz Privacy Settings
The launch of Buzz left Google with a black eye over several privacy mishaps. The main source of angst was the exposure of user Gmail contacts, and Google's rushed tweaks just weren't good enough. Now Google wants a total re-do--and perhaps forgiveness--with the implementation of even further fixes. Read More


E-GUIDE: APC by Schneider Electric

5 Ways to Shrink a Data Center
Most data centers can support an average density of 100 to 200 watts per sq. foot. The future of high-density computing – beyond 30 KW - will have to rely on water-based cooling, but is that cost effective? This expert guide discusses the latest energy technologies for today and the future. Read Now.

Vietnam rebuffs hacking claims from Google
Vietnam tersely rejected charges from Google that tens of thousands of Vietnamese-speaking PC users around the world were targeted by hackers. Read More

Foxit's updated PDF reader remains vulnerable to attack
Reacting to a demonstration that showed how attackers could force-feed malware to users without exploiting an actual vulnerability, Foxit Software patched its PDF viewer last week. Read More


WHITE PAPER: Dell

Automating Processes to Optimize a Windows 7 Deployment
Experts state that it is critical that planning for Windows 7 starts in the first half of 2010. With the cost per PC deployment estimated at $527-$700 per client, automating processes and leveraging outside expertise can reduce deployment costs and free your staff. Learn More Now

Are iPhones riskier than Android, Blackberry & Nokia phones?
iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say. Read More

Defamation and the battle for Internet freedom
Can you post insulting comments about someone on your Web site? Read More

The Cleanest Malware Scan
Michael Gersten wants to be absolutely sure malware can't interfere with his security scan. Read More

New cyber security threats noted in Blue Note annual report
A new report on consumer online behaviour and criminal activities on the Internet noted that new security threats have recently emerged, prompting the implementation of a mix of security solutions to protect unsuspecting victims. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. The iPad as iPod
  2. Cisco launches new servers, switches, SANs
  3. How Google wants to change telecom
  4. iPad as virtual desktop? Citrix says yes
  5. Enterprise cloud put to the test
  6. Microsoft releases desktop virtualization tools for Win 7
  7. Firefox: 30% of the world market
  8. As Windows 7 gains steam, VDI set to rise
  9. iPad teardown reveals first-rate design, build
  10. Slate Wars: 15 tablets that could rival Apple's iPad

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: