Search This Blog

Monday, May 03, 2010

Quest and NetPro: a win-win situation

Microsoft issues workaround, advice for SharePoint zero-day | US Air Force phishing test transforms into a problem

Network World Security: Identity Management

Forward this to a Friend >>>


Quest and NetPro: a win-win situation
This past week was 2010's The Experts Conference in Los Angeles. Formerly it was the Directory Experts Conference, which was started almost 10 years ago by NetPro's Gil Kirkpatrick. In recent years it's expanded to cover not only Active Directory but also Microsoft Exchange and SharePoint. Even NetPro's acquisition by Quest Software early last year has changed very little -- it's still very much Gil Kirkpatrick's baby. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: Websense

Websense Security Labs State of Internet Security 2H09
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009. Learn More

Microsoft issues workaround, advice for SharePoint zero-day
Microsoft urged SharePoint 2007 administrators to protect systems against a recently revealed zero-day vulnerability that could be exploited to steal company secrets. Read More

US Air Force phishing test transforms into a problem
Sorry Airman Supershaggy, "Transformers 3" is not coming to Andersen Air Force Base. And by the way, you've been phished. Read More


WHITE PAPER: HP

Quadruple VMs without Increasing NICs
IDC: As companies roll out blade-based virtualization deployments, many find that they have limited choices for network I/O. Virtual machines not only help bring more applications onto each server but also place additional demand on network I/O. Learn to adress these challenges. Read now.

Five top tactics in retail theft today
While the lousy economy of the past two years certainly hit retailers hard in the form of slow business, many stores had another problem to contend with as well: Increased theft. 2009 created "the perfect storm in retail shrink," according to Derek Rodner, vice president of product strategy at Agilence, a maker of retail loss prevention products. Read More

Naval Cryptologist Shopped Around Secret iPhone
The iPhone-Gate saga just gets more intriguing: According to reports from Wired and CNet, two of the major players involved in the sale of the iPhone prototype to tech blog Gizmodo have now been identified. Read More


WHITE PAPER: Double-Take Software

Virtualization and Disaster Recovery
The need to protect virtualized systems is paramount but organizations may not understand how vulnerable they are to disaster. This whitepaper discusses the challenges of protecting virtualized workloads and how Double-Take Software's solutions can help. Read Now.

Tips for using Twitter, Facebook and other "anti-social networks"
Corporations should institute daily one-minute Internet safety lessons that users must complete before they are allowed online, a security expert told Interop attendees this week, but he said even that might not work because attackers pay more attention to the advice than those it is intended to protect. Read More

Researcher: Social networks shouldn't reuse private info
A Microsoft researcher argues that user data should not be reused by social networks Read More

Glype 'anonymous' proxy may not cloak your identity
A widely used proxy service thought to provide anonymous Web surfing and used to skirt network administrator bans on access to sites like Facebook frequently reveals sensitive information about its users, according to a Swiss security researcher. Read More

Computer contractor gets five years for $2M credit union theft
For the second time this week, companies are getting a stark reminder of the danger posed to enterprise networks and assets by insiders with privileged access. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Confessions of tech hoarders
How much hardware do you have hidden in your home's nooks and crannies? One tech hoarder shares pictures of his stash, as well as those of some readers.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Microsoft kills Courier tablet project
  2. U.S. Air Force phishing test transforms into a problem
  3. Terry Childs juror explains why he voted to convict
  4. Apple comes down hard on iPhone leakers
  5. Jon Stewart assails Apple for becoming "big brother"
  6. Apple iTunes 9.1.1 software update released
  7. Eight signs you are an Apple addict
  8. 7 Android devices that aren't phones
  9. Interop: Avaya breathes new life into Nortel enterprise
  10. Texas man to plead guilty to building botnet-for-hire

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: