Monday, June 28, 2010

Relational database: An ongoing debate

  Quiz: Do you know IT security? | Protect the Data on Your iPhone 4
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Relational database: An ongoing debate
Over the years I've been writing about identity services it's always been taken as a given that the data store for identity information is a directory system (such as eDirectory, Active Directory, iPlanet, etc.). But there have always been those who espoused a relational database (RDBMS) as a "better" data store. It's an argument that's been going on for the entire 10 years this newsletter has been published, and one that is more political in nature than technological. Read More


DOWNLOAD: Qualys Inc.

Security & Compliance Suite Trial
QualysGuard Security & Compliance Suite Trial The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Learn More!

WEBCAST: Nimsoft

Reasons to Consider Cloud IT Monitoring
Join this Webcast to learn the value of IT monitoring delivered via the cloud. You can monitor and manage all business applications, from the data center to the cloud, including SaaS, hosted, and virtualized environments—all with a single product, architecture, and console. There's even a 30-day free trial download. View Now

Quiz: Do you know IT security?
Security is the No.1 priority for corporate networking executives, which means staying on top of the broad range of technologies used to fulfill the predominant model of network protection - defense in depth. Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more. Keep track of your score and see how well you do at the end. Read More

Protect the Data on Your iPhone 4
The popularity of the iPhone, combined with the small form factor of the device make it a prime target for thieves, and also make it highly unlikely that a lost iPhone 4 would be returned to its rightful owner. Make sure you set the security settings on your iPhone 4 to protect your sensitive business data and personal information. Read More

The Devil Is In The Details: DHS Monitoring Web & "Wrong" Words
Cyber-terrorists and the dreaded cyberwar has escalated to the point of the "feds" pulling the plug on the Internet in case of an emergency. Then DHS Secretary Janet Napolitano said that in the future there will be "increased" Internet monitoring of U.S. citizens due to the dangers of homegrown terrorism. Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Congress Questions Apple Over Privacy Concerns
The folks on Capitol Hill are the latest to take an interest in Apple. According to a report in the Washington Post, Representatives Ed Markey (D-Massachusetts)... Massachusetts - Ed Markey - Washington Post - United States - Capitol Hill Read More

Interesting Audience Data from the Symantec Government Symposium
Earlier this week, I participated in the Symantec Government Symposium, an event dedicated to IT and security professionals in the U.S. Federal government. As part of her kickoff presentation, Symantec Federal GM, Gigi Schaum, asked for audience responses to three questions. Here are the questions and the interesting responses: 1. Has the state of cybersecurity improved over the last 12 months?... Read More

OpenDNS launches family protection
OpenDNS has launched a home protection service Read More


VIDEO: Polycom

Lewis Brisbois Bisgaard & Smith Deploys IP UC Solutions
LBBS has begun using the Polycom® VVX® 1500 D, the industry's first simultaneous dual-stack (H.323 and SIP) media phone to combine advanced telephony, one-touch video, and integrated business applications. Learn more.

Advanced best practices for managing smartphones
Last week's article provided a summary of best practices for the basic management of smartphones in your organization. Going a step or two beyond the basic management techniques, Fiberlink Communications now provides us with best practices for more advanced management of the ubiquitous mobile devices that have become more computer than phone. Read More

Congress Asks Apple to Explain its Privacy Policy
Reps. Edward J. Markey (D-Mass.) and Joe Barton (R-Texas) are asking tough questions of Apple CEO Steve Jobs about recent changes to the company's privacy policy. The two congressmen sent a letter to Jobs on Thursday asking the company to explain its privacy changes and how they comply with user privacy safeguards built into Section 222 of the Federal Telecommunications Act. Read More

Twitter settles FTC privacy complaint
Social-networking giant Twitter has agreed to settle a complaint from the U.S. Federal Trade Commission alleging that the company deceived users and put their privacy at risk by failing to take appropriate security safeguards. Read More

The importance of sharing security know-how
In an ongoing effort to promote a more secure computing environment, software giant Microsoft has increased its efforts to share its in-house SDL [secure development lifecycle] practice throughout the industry. Adoption of this secure architecture would help reduce the number of vulnerabilities as well as promote continuous improvements, it said. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

The view from the Googleplex
We recently visited the "Googleplex," Google's expansive headquarters in Mountain View, Calif., for an interview, and took the chance to snap a few pictures of life inside what must be one of the most entertaining workplaces in America.

Network access control in a nutshell
Twelve leading NAC products were put to the test. Here's what we found.

MOST-READ STORIES

  1. Quiz: Do you know IT security?
  2. Super software secrets
  3. Beyond the petaflop: DARPA wants quintillion-speed computers
  4. iOS 4's hidden features
  5. Apple 4 opening day: Not all is iPhone-tastic
  6. VMware's Maritz: OSes are having their jobs stolen
  7. Report: Users find yellow discoloration on iPhone 4 screens
  8. How HTML5 will change the Web
  9. Google Voice: 10 reasons to check it out
  10. iPhone vs. Droid vs. BlackBerry

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment