Search This Blog

Wednesday, June 02, 2010

UnboundID upgrades Directory Services platform

FTC shoves identity theft rule deadline to year-end | 'Likejacking' exploit fools Facebook users and friends

Network World Security: Identity Management

Forward this to a Friend >>>


UnboundID upgrades Directory Services platform
In the last issue I lamented about the wealth of conferences and trade shows that are identity related. Two others I missed while I was traveling in Europe were Denver's Gluecon and the Smart Card Alliance Annual Meeting. Read More


RESOURCE COMPLIMENTS OF: SailPoint

Live Webinar featuring Burton Group: Rethinking Provisioning
IS YOUR PROVISIONING SOLUTION STRETCHED TO THE LIMIT? Join SailPoint and Burton Group on June 10 to discuss the new compliance and business demands affecting the identity management landscape. You'll get a roadmap that leads to provisioning success. And, you'll learn about new technology that gets you from here to there quickly. REGISTER NOW!

WHITE PAPER: Tripwire

5 Challenges: Continuous PCI DSS Compliance
With adoption of the PCI DSS expanding throughout the United States and into Europe, organizations subject to PCI compliance face several key challenges. Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help. Read Now.

FTC shoves identity theft rule deadline to year-end
Pestered by lawsuits and requests from congress the Federal Trade Commission said it will further delay the enforcement of its Red Flags identity theft protection rule to December 31, 2010, while Congress considers changes to legislation that could alter the rule's coverage areas. The rule was to go into law June 1 and has been delayed many times since the original implementations date of Nov. Read... Read More

'Likejacking' exploit fools Facebook users and friends
Hundreds of thousands of Facebook users were hit over the holiday weekend by a trick that spreads a clickjacking worm once the victim has been fooled into "liking" a page. Once that is done the action installs a Trojan and recommends the page to the victim's friends. Read More

Report: Google Ditches Windows Over Security Issues
Google employees are slamming Microsoft's Windows operating system, claiming security vulnerabilities in the OS left the company open to Chinese hackers in January 2010, a new report says. According to the Financial Times, Google will ditch the internal use of Windows in exchange for alternative operating systems including the Mac OS, Linux, and Google's own forthcoming Chrome OS operating system. Read More

Satellite gap fuels climate, weather monitoring worry
Gaps in key climate and space weather satellite technology could hurt scientists' ability to predict, monitor and understand long-term climate changes, space weather and other Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Only 18 percent of firms prepared for World Cup IT overload
Eighty-two percent of businesses have not planned for the potential overload on their IT systems as staff are expected to follow the World Cup during work hours, a new survey has found. Read More

7 essential business negotiation tactics
Want to negotiate more effectively in professional and personal settings? Talk less and listen more. Read More

Ofcom publishes draft Code to tackle net piracy
The names and number of times Brits have illegally downloaded copyrighted material from the web must be logged by ISPs, according to Ofcom. Read More

What You Don't Know about Your Online Reputation Can Hurt You
Social networking, and the broader concept of online privacy, have been under some rather intense scrutiny over the past couple of weeks. The issues at Google--voracious indexer of all things Internet, and Facebook--the largest social network and number one most visited site (according to Google) have made many users more acutely aware of what information is available about them on the Internet. However, your online reputation is being used in ways you may not be aware of, and could cost you. Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Endpoint security: managing enterprise smartphone risk
Almost by the day, enterprises are becoming more receptive to the consumerisation of IT and introduction of mobile devices and platforms into their environment. Read More

Don't Let Your PC Join the Zombie Hordes
You may not be aware of this, but aside from Cinco de Mayo, Mother's Day, and Memorial Day, there is another important event in the month of May--Zombie Awareness Month. While the month is intended to honor the sort of Zombieland, Night of the Living Dead, or Michael Jackson's Thriller type zombies, it also seems like an appropriate time to address PC zombies and how to ensure that the computers on your network don't become compromised and join the zombie hordes. Read More

Enterprise risk management: all systems go
When Bill Badertscher arrived at Georgetown University three years ago, campuswide security was handled in several departments with little coordination among teams. It was time for a change. Badertscher is Georgetown's senior engineer for facility and safety control systems and leader of a new IT team that focuses on the same areas. The goal is to address enterprise risk management (ERM) by redefining it to include nontraditional systems. Understanding that security is mission-critical has led the University Safety and Information Services departments to work together in unprecedented ways. Read More

Internet Identity Workshop reveals OpenID clashes
There are too many identity-related trade shows and conferences spread over venues all over the world and not enough time to get to them all. It's a far cry from when we started this newsletter 10 years ago, and the increased interest in identity issues should be applauded, but I can't be everywhere at once! Read More

Google Wi-Fi Snooping Should Serve As Security Wakeup Call
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon. Peeved government officials in both Europe and the U.S. are pressing Google for more details on how the search company's Street View cars managed to cull personal data from Wi-Fi networks that weren't password-protected. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

Steve Ballmer as emoticons
It's not often hard to guess what Steve Ballmer is feeling. The Microsoft CEO has one of the most recognized, and photographed, faces in the IT industry - and it's also one of the most expressive.

MOST-READ STORIES

  1. Will an open-source alternative to Facebook actually work?
  2. What desktop virtualization really means
  3. How to foil Web browser 'tabnapping'
  4. 10 useful Firefox-based apps
  5. Verizon's tiered LTE plans fuel 'bill shock' debate
  6. IPv6 summit was a huge hit
  7. Google is no competitor for Skype - yet
  8. Woman sues Google because of bad directions
  9. BBC launches iPlayer for iPad beta
  10. 44 million stolen gaming credentials found in online warehouse

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: