Wednesday, July 28, 2010

CA unveils virtual suite; PacketMotion upgrades compliance product

What to watch at Black Hat and Defcon | Do Not Call Registry hits 200M phone numbers

Network World Security: Identity Management

Forward this to a Friend >>>


CA unveils virtual suite; PacketMotion upgrades compliance product
Today's issue, like the previous one, is devoted to catching up on recent announcements. First up is CA (formerly Computer Associates) with an announcement about five products in what CA calls its "Virtual portfolio". Read More


WHITE PAPER: Palo Alto Networks

Re-Inventing Network Security
Enterprise networks and applications have evolved but security infrastructure has not. Learn why application visibility and control (regardless of port, protocol, or encryption) are critical for preventing increasingly sophisticated threats that target enterprise users and data. Read now!

REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

What to watch at Black Hat and Defcon
Trying to predict the big news at this week's Black Hat and Defcon conferences is extremely tricky, if not impossible. Usually the most interesting stories pop up at the very last minute -- hackers tend to hold off on disclosing the really big talks because they don't want jittery lawyers to shut them down. And even when you think you know what's going on, sometimes one of the shows steps forward to take center stage, as Defcon did three years ago when Dateline NBC reporter Michelle Madigan was run out of the conference for trying to secretly film show attendees. Read More

Do Not Call Registry hits 200M phone numbers
Stopping those unwanted telemarketing calls right as you sit down to dinner is proving to be quite popular. The Federal Trade Commission today said phone numbers in the Do Not Call Registry now exceed 200 million and since 2003, the agency h Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

Black Hat may keep quiet about plans for controversial talks
Black Hat organizers are looking to avoid pressure from outside groups to cancel important presentations by withholding details of selected talks at future events. Read More

Black Hat: Most browsers can be made to give up personal data
All the most commonly used Internet browsers are vulnerable to exploits that can force them to cough up users' personal information that can be used to hack into bank accounts or set them up for other attacks, the Black Hat 2010 conference will be told this week. Read More


WHITE PAPER: Tripwire

Have You Committed a Security Sin?
Almost every organization that has had a major security breach is guilty of at least one of the 7 deadly sins of network security. Learn what they are in this CSO eGuide that provides tips on keeping the villains out, reveals new mega threats and explains how to avoid pitfalls in log management planning. Read More!

NAC decisions you need to make now
One important piece of a multilevel security defense for companies of almost any size is network access control (NAC), which lets you enforce policies for end-user machines. Read More

Search engine optimization techniques for hackers
At DefCon, Barracuda Labs will explain how malware pushers use search engine optimization techniques to push their poison to the top of those Google rankings. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment