Monday, June 07, 2010

The case for XLDAP

What would your ultimate network security look like? | Adobe: We know we're hackers' favorite target

Network World Security: Identity Management

Forward this to a Friend >>>


The case for XLDAP
There's still one or two issues to bring up from last month's European Identity Conference, which I want to get to this week -- one from a panel I was on and another from one I wasn't on. Read More


RESOURCE COMPLIMENTS OF: SailPoint

Live Webinar featuring Burton Group: Rethinking Provisioning
IS YOUR PROVISIONING SOLUTION STRETCHED TO THE LIMIT? Join SailPoint and Burton Group on June 10 to discuss the new compliance and business demands affecting the identity management landscape. You'll get a roadmap that leads to provisioning success. And, you'll learn about new technology that gets you from here to there quickly. REGISTER NOW!

WEBCAST: Oracle

Accelerate Access Governance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. Sift through key, mandatory requirements and features and functionality that can wait. There is guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now

What would your ultimate network security look like?
Is it possible that given a clean slate and likely millions of dollars, engineers could come up with the ultimate in secure network technology? Read More

Adobe: We know we're hackers' favorite target
Adobe knows that some of its software is not only in the security spotlight but also in hackers' crosshairs. And it's okay with that. Read More

Facebook hopes new privacy page can quell unrest
Facebook unveils a new page that will serve as a resource for users looking to better protecting their privacy. Read More


WHITE PAPER: Riverbed

Strategies for Unleashing Cloud Performance
Whether a business builds out its own cloud or buys cloud services from someone else, they need to be sure the end results are optimized for the speed users require. This paper identifies where the limitations of cloud computing exist and provides actionable strategies to unleash cloud performance. Click here!

Google relents, will hand over European Wi-Fi data
In a reversal of course, Google now says that it will give European regulators data it secretly collected from open wireless networks over the past three years. Read More

California Casualty ditches Cisco security box
A brief case study of California Casualty's decision to ditch its Cisco MARS security box in favor of a less expensive and more comprehensive product from AccelOps. Read More

Faulty firewalls and damaged DNS
Mark Gibbs has sorted out both his misbehaving firewall and his DNS lookup problems. Next, leaping tall buildings in a single bound! Read More


WHITE PAPER: Websense

Essential Information Protection
Successful organizations depend upon their ability to collaborate, communicate, and share information online. This paper explains how Essential Information Protection is designed to help organizations make the most of their IT security investments. Read More

WA Government to secure judicial officers' homes
The Western Australia Department of the Attorney General has declined to comment on a new initiative that will see security systems, including CTV cameras and video intercom systems installed in the homes of judicial officers. Read More

Facebook users get, 'like', infected
Thousands of PCs have reportedly been infected with a Trojan delivered through a Facebook exploit, according to a security firm. Read More

HSBC browser plugin attacked by Trojan
A popular anti-keylogging tool used by online banks such as HSBC, Trusteer's Rapport, has come under direct attack by malware writers trying to bypass its protection settings. Read More

Debriefing: Security budget requests through the years
1985 Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

Steve Ballmer as emoticons
It's not often hard to guess what Steve Ballmer is feeling. The Microsoft CEO has one of the most recognized, and photographed, faces in the IT industry - and it's also one of the most expressive.

MOST-READ STORIES

  1. Microsoft plans gigantic Patch Tuesday next week
  2. Android rootkit is just a phone call away
  3. Five things to pass along to new networkers
  4. 10 useful Firefox-based apps
  5. Users find the secrets of WAN optimization
  6. Google wants to patent 'snoop' technology
  7. A history of portable computing
  8. FTC cracks down on spyware seller
  9. Photo forensics: Identifying faked pictures
  10. Read and react to Richard Clarke's new book, "Cyber War!"

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment