Monday, May 10, 2010

Federated identity project on the horizon

FTC: Fraud more likely than brute crime at your local ATM | Modern hack attacks are developing a laser focus

Network World Security: Identity Management

Forward this to a Friend >>>


Federated identity project on the horizon
From time to time in this newsletter we take a look back 10 years to see what we were talking about "back in the day." The newsletter was called "Focus on Directory Services" back then. But going back even further, before there were Network World newsletters, directory services often featured prominently in my Wired Windows column. One idea that was near and dear to my heart was the concept of "federated directories." Read More


WHITE PAPER: PC Mall

Server Virtualization: Breaking Performance Barriers
Server virtualization reduces cost, increases availability and enhances business agility. But for many companies, a focus only on cost reduction can become a problem. Download this HP white paper to learn how to reap virtualization's additional benefits, including built-in, cost-effective high availability & disaster recovery. Learn More

WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

FTC: Fraud more likely than brute crime at your local ATM
ATM fraud is more common and likely than crime committed directly against customers Read More

Modern hack attacks are developing a laser focus
Threats to data security are changing in a dangerous way. They are becoming laser-focused on sensitive information such as intellectual property and cardholder data. Symantec has observed this shift over a period of years through its Global Intelligence Network. Read on to learn about the challenges this poses for most IT organizations. Read More


WHITE PAPER: HP

Quadruple VMs without Increasing NICs
IDC: As companies roll out blade-based virtualization deployments, many find that they have limited choices for network I/O. Virtual machines not only help bring more applications onto each server but also place additional demand on network I/O. Learn to adress these challenges. Read now.

Unfortunate domain name attracts script-kiddies
Website defacements are nothing new, and are a rather trifling concern for security managers. They are low-hanging fruit, and the artworks of budding professional hackers and would-be penetration testers. Read More

Q&A: Facebook users aren't outraged over privacy issues
Facebook executive Ethan Beard defended the firm's privacy policies, noting that users join the social network specifically to share personal information with others. Read More


WHITE PAPER: Oracle

Business Agility Strategies For Midsize Organizations
Midsize businesses have enormous IT pressures: building an infrastructure that is flexible, designed to accommodate rapid growth and meets compliance challenges with resources nowhere near larger enterprises. This video whitepaper explains how Oracle is delivering applications specifically for midsize businesses. Learn More

Verizon and Novell team up on cloud security
Verizon and Novell have teamed up to deliver a cloud-based security solution Read More

Security firm reveals Microsoft's 'silent' patches
Microsoft silently patched three vulnerabilities last month, two of them affecting enterprise mission-critical Exchange mail servers, without noting the bugs publicly, a security expert said today. Read More

The DDoS attack survival guide
How botnets and application vulnerabilities have made DDoS attacks more damaging than ever before, and what you can do to fight back. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Hacker develops multi-platform rootkit for ATMs
  2. Wi-Fi key-cracking kits sold in China mean free Internet
  3. Sixth grader usurps software company
  4. Security firm reveals Microsoft's 'silent' patches
  5. IPv6 tunnel basics
  6. Apple-Adobe feud: Is Flash as bad as Jobs says?
  7. Feds shred counterfeit Cisco trade
  8. Is the Android truly open source?
  9. How many zettabytes can dance on a head of a pin?
  10. 10 hot energy projects that could electrify the world

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

  1. Anonymous10:18 PM

    Thanks for sharing this info with us.
    Natick Mall

    ReplyDelete