Search This Blog

Wednesday, July 21, 2010

Courion bolsters Access Assurance Suite

Network World Security: Identity Management - Newsletter - networkworld.com
Operation Death Match reaps another identity thief | Is ubiquitous encryption technology on the horizon?

Network World Security: Identity Management

Forward this to a Friend >>>


Courion bolsters Access Assurance Suite
The biggest fish in the small (well, medium-sized) pond of pure play IDM vendors is still Courion, and it extended its reputation for having the most complete IAM solution with the last week's announcement of Compliance Manager for File Shares, a new capability for their Access Assurance Suite designed to protect sensitive information in unstructured data formats found in file shares, such as Microsoft Office files, .pdf files, and audio, video and CAD files. Read More


RESOURCE COMPLIMENTS OF: Quest Software

Choosing the Right Active Directory Bridge Solution
What do you need to know when evaluating AD bridge solutions? In this Quest Software white paper, discover the questions to ask when choosing the best solution for your company. Don't waste time and money with systems that don't play well together! Read More

REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

Operation Death Match reaps another identity thief
Federal authorities don't take kindly to people stealing the identities of dead folks. A British citizen whose real name is John Skelton this week became one of the 150 people that have been arrested and charged with federal passport fraud and related offenses under a program known as Operation Death Match. Read More

Is ubiquitous encryption technology on the horizon?
Will ubiquitous encryption of important network traffic ever happen? A group of researchers presenting at next month's Usenix Security Symposium will talk about a technology they say could make end-to-end encryption of TCP traffic the default, not the exception. Read More

Safety a big target in letting unmanned aircraft in national airspace
There is a push by a variety of proponents to give unmanned aircraft more free reign in the nation's airspace but safety is a Read More

DARPA issues call for computer science devotees
The Defense Advanced Research Projects Agency is looking for a few good computer science researchers who might be interested in developing systems for the US military. The move is seen, in part anyway, as a way for the agency to win more heart and minds of the advanced science community. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Playboy's new site is safe for work? … Aw, Hef's such a kidder
Ever since Playboy announced that it intended to launch a new Web site called The Smoking Jacket that we were promised would be safe for everyone to read at work, I've been anxious to see whether the legendary Hugh Hefner could -- or would -- actually produce such a thing. The site launched officially today, soooo .... Is it really safe for work? Read More

After worm, Siemens says don't change passwords
Although a newly discovered worm could allow criminals to break into Siemens' industrial automation systems using a default password, Siemens is telling customers to leave their passwords alone. Read More

E.U. plans to limit its use of private personal data
The European Union is to impose stricter rules on its own use of private citizens' data for all future anti-terrorism measures. Read More

Adobe to beef up PDF security with Reader sandboxing
Adobe today announced that it will harden the next version of its popular Reader PDF viewer, a frequent target of attacks, by adding "sandboxing" technology to the software. Read More


E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

Microsoft 'working' on patch for critical Windows vulnerability
Microsoft is now working on a patch to prevent exploits of a newly discovered vulnerability that affects all versions of Windows. Read More

IBM device secures online banking
IBM this week rolled out a security device it says will protect online banking and keep cyber-criminals from being able to make fraudulent funds transfer even from a compromised PC. Read More

Network security for the masses
Information security is an exalted field. Exalted both in the sense of "noble" and in the sense of "inflated". We practice security as a dark art, a complex discipline of insiders with obscure acronyms. Even more than other areas of IT, security professionals are a "special" breed, as one can clearly see by the many certifications following our names, almost like titles of nobility. Yes, security is complex and esoteric. No, it should not be the practice of the few, but the practice of the many. Read More

Black Hat talk to reveal analysis of hacker fingerprints
Looking deeper within malware yields fingerprints of the hackers who write the code, and that could result in signatures that have a longer lifetime than current intrusion-detection schemes, says one Black Hat 2010 speaker. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. New rootkit threatens all versions of Windows
  2. NASA revamps historic 9 million lb Mars antenna
  3. Windows Phone 7 'preview' winning generally good reviews
  4. Cisco to pay up to $112 million in Power-over-Ethernet patent case
  5. Security Secrets the Bad Guys Don't Want You to Know
  6. Google updates Postini spam engine to stop new JavaScript attacks
  7. 15 summer vacation ideas for geeks
  8. Dell offering free Web browser security tool
  9. Robocop ran DOS
  10. Droid X vs. Droid

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: