Search This Blog

Monday, May 17, 2010

Revealing the 'cracks' in provisioning

Car hackers can kill brakes, engine, and more | Intelsat rogue satellite: Nothing to worry about

Network World Security: Identity Management

Forward this to a Friend >>>


Revealing the 'cracks' in provisioning
At the recent European Identity Conference, Cyber-Ark's Shlomi Dinoor (he's vice president of Emerging Technologies) emphasized to me that nothing is ever 100% in IdM. While our topic was "Security and Data Portability in the Cloud" he wanted to remind me that provisioning -- the oldest of IdM services -- was still somewhat problematic. He did this by pointing me to a recent article in Dark Reading: "Database Account-Provisioning Errors A Major Cause Of Breaches." Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Car hackers can kill brakes, engine, and more
University researchers have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results. Read More

Intelsat rogue satellite: Nothing to worry about
Looking to mitigate some of the fall-out from its rogue satellite, Intelsat today said its meandering Galaxy 15 satellite poses no real danger of crashing to Earth, or into another satellite.  Read More


WEBCAST: Actuate

Solve Data Needs: BIRT Defined
This webcast will give you a primer on BIRT including the technology and the community. BIRT can help you overcome the challenge of delivering accurate and meaningful data to users while minimizing IT development efforts. Learn more today!

May Vulnerability Report - Sourcefire
May 14, 2010 - The latest security vulnerabilities and patching information, courtesy of Sourcefire. Read More

New Security Minister plans cyber-defence rethink
The UK has a new Security Minister, Baroness Pauline Neville-Jones, who takes up a non-cabinet post that gives her the job of shaking up the UK's fragmented cybersecurity infrastructure. Read More


WHITE PAPER: Websense

Essential Information Protection
Successful organizations depend upon their ability to collaborate, communicate, and share information online. This paper explains how Essential Information Protection is designed to help organizations make the most of their IT security investments. Read More

Five lessons Facebook needs to learn
Facebook has turned into a piñata, and it seems like everyone is getting their chance to whack it with a stick. So far we haven't seen any candy, but a lot of other interesting stuff has come flying out. Read More

Report blames 'Avalanche' group for most phishing
A new report blames a single Eastern European gang for about two-thirds of all phishing attempts conducted in the last half of 2009. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Car hackers can kill brakes, engine and more
  2. Major Wi-Fi changes ahead
  3. Wikipedia lands $1.2M grant to improve 'public policy' articles
  4. IPv6: D-Day coming for ISPs
  5. Worst phishing menace may be prepping more dangerous version
  6. What WiMAX 2 promises
  7. Yahoo's ingenious plan to force users to switch to Gmail
  8. Natal to be on MTV with Cirque du Soleil
  9. New Adobe ad campaign shows Apple some tough love
  10. Facebook IDs hacker who tried to sell 1.5 million accounts

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: