Search This Blog

Wednesday, July 14, 2010

No all-encompassing IdM in near future

Researchers unsheathe new tool to battle botnets | One final patch for Windows XP Service Pack 2 before it reaches end-of-life

Network World Security: Identity Management

Forward this to a Friend >>>


No all-encompassing IdM in near future
I didn't make it to The Burton Group/Gartner's Catalyst conference in Prague this year, but I have heard from folks who did get there. Read More


RESOURCE COMPLIMENTS OF: Quest Software

Crash Course in UNIX Privileges
UNIX root privileges make is easy for someone to change ownership of files, bind well-know TCP/IP ports, kills running processes and more. The poor granularity of super-user security makes organizations extremely vulnerability to careless and malicious errors. See how to truly protect your infrastructure. Read More

WHITE PAPER: Qwest

The Three Ps of Evaluating Managed Network Services
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

Researchers unsheathe new tool to battle botnets
While many botnets such as Storm, Kraken and Conficker can carry out their destructive campaigns without detection or any particular means to stop them, a group of researchers says it has come up with a way to use a botnet's own techn Read More

One final patch for Windows XP Service Pack 2 before it reaches end-of-life
A moment of silence, please, for Windows XP Service Pack 2. Today is the final day the software is eligible for security updates, and as Service Pack 2 rides off into the sunset Microsoft has given it one final patch that will prevent some zero-day attacks. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
See how you can transform customer information and feedback into actionable results. Read now!

Bluetooth at heart of gas station credit-card scam
Thieves are stealing credit-card numbers through skimmers they secretly installed inside pumps at gas stations throughout the Southeast, using Bluetooth wireless to transmit stolen card numbers, says law enforcement investigating the incidents. Read More

BlackBerry offers users free security app
BlackBerry maker RIM has shown a new free application that owners can use to track their much-loved smartphones in the event they are lost, stolen, or simply misplaced around the house. Read More


WHITE PAPER: Qwest

The Myths, the Market Drivers and What You Need to Know
To create a consistent, seamless Unified Communications (UC) experience across your organization, you must first examine your existing infrastructure and business processes to determine what components will work best for your business. Get an overview of the potential benefits of UC, including key considerations for mapping out your UC strategy. Read now!

Bizarre phone ransom Trojan found by researchers
Researchers have discovered a bizarre piece of Trojan ransomeware which disables programs on infected PCs before demanding victims make an unaccountably small payment to a Ukrainian mobile phone network in return for an unlock code. Read More

Security vendor GFI Software acquires Sunbelt Software
GFI Software Tuesday announced it has acquired Sunbelt Software for an undisclosed price. The companies said the goal of the merger is to develop integrated security products for both on-premises use and the cloud. Read More

The challenges of cloud security
Some IT execs dismiss public cloud services as being too insecure to trust with critical or sensitive application workloads and data. But not Doug Menefee, CIO of Schumacher Group, an emergency management firm in Lafayette, La. Read More

Review: Firewall operations management
Anyone running multiple firewalls in a complex, enterprise environment knows how difficult it can be to catch misconfigurations, avoid conflicting rules, identify vulnerabilities and meet auditing and compliance mandates. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. 8 amazing things you'll do with Windows 8
  2. Newest attack on your credit card: ATM shims
  3. Java supplants IT security as most sought-after tech skill set
  4. SIP trunking: A primer
  5. 15 free enterprise collaboration tools
  6. Desktops gone wild
  7. Consumer Reports and the iPhone 4: Not recommended
  8. How to keep Windows XP SP2 safer after Microsoft stops patching
  9. Complaints mar Google Android App Inventor
  10. iPhone 4 "bursts into flames!" Probably the antenna

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: