Monday, June 14, 2010

Google needs to search under "wrong"

  Identity management top security priority in Gartner survey | US Coast Guard calls for high-tech help in BP oil disaster
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Google needs to search under "wrong"
It seems Google can't do much of anything without riling some government somewhere in the world. The latest flap comes from an investigation launched by the Australians. This is a follow-on to an investigation started by the Germans in which "Google acknowledged that it had mistakenly collected fragments of data over public Wi-Fi networks in more than 30 countries while taking pictures of neighborhoods for the Street View feature." Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Riverbed

Strategies for Unleashing Cloud Performance
Whether a business builds out its own cloud or buys cloud services from someone else, they need to be sure the end results are optimized for the speed users require. This paper identifies where the limitations of cloud computing exist and provides actionable strategies to unleash cloud performance. Click here!

Identity management top security priority in Gartner survey
"The No.1 priority is now identity and access management," says Gartner research director Vic Wheatman, noting the analysis is based on a close look at what IT security professionals at 308 companies are telling Gartner about their overall information spending and specific IT security projects. Read More

US Coast Guard calls for high-tech help in BP oil disaster
The US Coast Guard has issued a call for better specialized technology to help it better respond to the ever-widening BP Deepwater oil spill disaster in the Gulf of Mexico. Read More

FBI iPad Investigation: a FAQ
Roughly 114,000 Apple iPad users' e-mail addresses were leaked this week, and now the FBI is looking into the matter to determine the threat level. Given the iPad's stunning popularity and the frightening number of affected owners, many questions need answering. Here's a FAQ about Apple and AT&T's new relationship with federal investigators. Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Safari 5 packs dozens of security patches
The newly-released Safari 5 comes with a healthy performance boost plus a few great additions, such as Reader and Extensions, that have sparked some discussion throughout the Web. Read More

Microsoft confirms critical Windows XP bug
Microsoft has confirmed that Windows XP and Windows Server 2003 contain an unpatched bug that could be used to infect PCs by duping users into visiting rigged Web sites or opening attack e-mail. Read More

Adobe Fixes Flash Zero-Day with Massive Security Update
Adobe has been in the headlines for all the wrong reasons recently with new attacks exploiting flaws in Adobe Flash and Adobe Reader. Adobe has addressed the security vulnerabilities now with an immense update resolving a variety of serious issues. Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

How to delete fake antivirus
QUESTION Our son's laptop has started throwing up virus alerts for Antivirus 7.0. We've searched online for a solution, but can't differentiate between genuine advice and yet more scareware. Andrew & Eileen Wood Read More

Online porn users take huge risks, study finds
Online porn is one of the most hostile environments on the Internet but malware distribution itself appears to be only a profitable sideline for the adult industry, a new study has suggested. Read More

iPad 3G Leak Flaw More Common than You Think
AT&T is taking some well-deserved heat for a Web security flaw resulting in the exposure of more than 114,000 iPad 3G owners' e-mail addresses. Apple--by proxy--has also drawn some criticism as it apparently has some culpability in defining the authentication mechanism that was exploited. It is obviously a huge embarrassment for both AT&T and Apple, but the underlying issues, and other Web security issues like it, are actually quite common. Read More

Most popular stories this week: June 11
Michael Cooney's celebration of life-changing algorithms was rediscovered this week, amidst all of the hubbub over Apple's new iPhone 4. Plus, Network World's look at the 20 greatest arguments in tech was quite popular. Check them out if you haven't already. 1. 15 genius algorithms that aren't boring 2. Visual tour: Windows Phone 7 Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

5 things we love/hate about cloud automation tools
Here are some things we love and some things we hate about cloud automation tools.

MOST-READ STORIES

  1. Google researcher put customers at risk
  2. 30% of Brits will watch World Cup online
  3. Amazon cloud uses FedEx instead of Internet to ship data
  4. Networking's 20 greatest arguments
  5. 6 strange ways to make money online
  6. FTC bombs massive robocall operation
  7. Google can't wash hands of Windows bug disclosure
  8. 8 trends driving IT job growth, salaries
  9. Microsoft confirms critical Windows XP bug
  10. Steve Jobs' WWDC Wi-Fi meltdown - a little perspective
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment