Wednesday, May 19, 2010

A shift in cloud solutions

USB worm named biggest PC threat | EFF: Forget cookies, your browser has fingerprints

Network World Security: Identity Management

Forward this to a Friend >>>


A shift in cloud solutions
I've been writing about the European Identity Conference recently, but it wasn't the only conference in Munich the first week in May. The EIC was held in conjunction with Cloud 2010, also produced by Kuppinger-Cole. The intersection of IdM and the cloud is particularly important to look at now because there are some semantic issues that need to be settled so that we can properly talk about what's important -- and what isn't. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Learn More

USB worm named biggest PC threat
A worm which is spread via USB flash drives has been named the biggest security threat to PC users by McAfee. Read More

EFF: Forget cookies, your browser has fingerprints
Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation. Read More


WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

New tool exposes cloud security holes
Fortify Software has come up with a way for companies interested in moving their applications to a cloud provider can analyse it line by line for security-worthiness in the new environment. Read More

FTC asked to investigate Google Wi-Fi 'snooping'
A consumer group has called on the U.S. Federal Trade Commission to investigate Google after the search company revealed that it had been collecting people's Internet communications from open wireless networks. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Huge 'sexiest video ever' attack hits Facebook
A huge attack by a rogue Facebook application last weekend infected users' PCs with popup-spewing adware, a security researcher said. Read More

Legal risks with virtual currencies in online games
As virtual currency shifts from being a prepayment for goods or services redeemable with one company to a widely accepted proxy for real currency or a means of transmitting money between various participants, Issuers need to consider state and federal services laws such as money transmitter laws and money service business laws. Read More

Passwords, scams, and you
Reader Deb Ward is the victim of an increasingly common scam. She writes: Read More

CA World: UK focus on governance 'strong'
A focus on standards, such as ISO certification, is still a strong trend in the UK, according to CA Technologies. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
  2. Dear Steve Jobs: Your iPad isn't 'revolutionary'
  3. Juniper collapses the data center
  4. EFF: Forget cookies, your browser has fingerprints
  5. Facebook users warned of sexy 'Candid camera prank' attack
  6. Comcast signs first IPv6 corporate customer
  7. Car hackers can kill brakes, engine and more
  8. Study: P2P networks a treasure trove of healthcare data
  9. Google stops sniffing Wi-Fi data after privacy gaffe
  10. Steve Jobs 2 a.m. e-mails: Apple motives pure, hits out at Adobe

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment