Monday, July 19, 2010

Quest acquisition is strong IAM move

  Air Force streamlines cybersecurity hiring for 680 open positions | Will security worries propel DNS into the cloud?
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Quest acquisition is strong IAM move
The East Coast of North America is going through an unprecedented heat wave, but here on the West Coast it still feels like spring. Adding to that feeling, for me, is the number of announcements that major vendors are making --such as the two big ones in the past week. Read More


WHITE PAPER: HP

Setting Up a Seven-Figure IT Cost Avoidance at JEA
Learn how storage acquisition costs are 67% lower, performance is faster, recovery takes minutes instead of days, and a seven figure cost avoidance lies ahead. Read Now

WHITE PAPER: HP

HP Business Value of EVA Storage Virtualization
This Edison Group report is an independent assessment of the architecture and business benefits of HP StorageWorks Enterprise Virtual Array (EVA). Learn how EVA enables access to the storage in a single array by numerous hosts, tiered storage within the array to different types of drives and better performance than non-virtualized systems. Read Now.

Air Force streamlines cybersecurity hiring for 680 open positions
The Air Force today said its managers hiring civilian federal employees for certain cybersecurity openings can use a streamlined method to rapidly fill more than 680 positions. Read More

Will security worries propel DNS into the cloud?
Security on the Internet's Domain Name System will be tightened today, with the addition of digital signatures and public-key encryption to the root zone. But will the deployment of DNS Security Extensions (DNSSEC) prompt more enterprises to outsource their DNS operations? Read More


WHITE PAPER: HP

Virtualize your end-to-end IT infrastructure
A virtual storage infrastructure available only from HP can double your capacity utilization and cut management costs in half with innovations that unlock trapped capacity in individual servers or in enterprise disk arrays. Learn how. Read Now

Mozilla hikes Firefox bug bounties to $3K
Mozilla on Thursday boosted bug bounty payments six-fold by increasing the standard cash award to $3,000. Read More

Gain the upper hand on governance and compliance with SaaS-based SecureGRC
Most of the governance, risk and compliance automation tools on the market are aimed at large enterprises with complex environments and deep resources. But smaller companies need governance and must meet compliance mandates, too. Now these companies have the option of a SaaS-based GRC solution that comes with a low subscription rate rather than a high purchase price. Read More


WHITE PAPER: HP

Implementing Tiered Storage:
IDC: Enterprises that are investigating deploying a tiered storage architecture should consider using an external services provider to assist with the migration. Of critical importance is the ability to offer a range of services from the initial planning all the way through to ongoing support and management. Read Now

White House meeting aimed to assert cybersecurity leadership
The White House meeting on cybersecurity issues held on Wednesday appears to have been as much about assessing progress on the Presidents cybersecurity agenda as it was on showing executive office leadership on the issue. Read More

The top 10 'most wanted' spam-spewing botnets
Spam continues to grow largely due to the growth in malicious botnets. Many botnets are command-and-control systems used by criminals and are still the main way that spam is spewed into your e-mail box. M86 Security says that the worldwide spam volume has now climbed to 230 billion messages per day, up from 200 billion at the start of 2010. Read More

Check your credit-card bills
The Federal Trade Commission (FTC) just halted an elaborate scheme which resulted in more than $10 million in bogus charges on consumer credit and debit cards. How could an organized international ring get away without notice by consumers? The Identity Theft Resource Center (ITRC) believes many bills are being paid blindly, without confirming each transaction. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Robocop ran DOS
  2. Paper to readers: Comments now cost 99 cents
  3. Droid X vs. Droid
  4. EFF Fights To Allow People To Comment Anonymously Online
  5. Antenna guru: 'Get a bumper and learn the Vulcan iPhone Pinch'
  6. David Letterman piles on Apple's iPhone 4 problems
  7. Apple's antenna guru reportedly warned execs about iPhone 4 design
  8. India's new Rupee symbol won't show soon on computers
  9. Cisco Linksys among millions of hackable routers
  10. World's Weirdest PC Game Controllers

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment