Search This Blog

Monday, August 02, 2010

Cloud vision or clouded vision?

  US military wants to protect social media privacy | FBI details worst social networking cyber crime problems
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Cloud vision or clouded vision?
I missed the recent Catalyst Conference, the first I've missed in a dozen years. But over the next few weeks I will bring up things from the conference, as reported by a number of friends who did attend. But thinking about Catalyst, I looked to see what happened there 10 years ago as, perhaps, a good topic for one of our occasional "10 years ago in this newsletter," and I did find a gem. Read More


REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

US military wants to protect social media privacy
Military researchers are embarking on a project designed to provide social media users on Facebook or even Google for that matter, greater privacy. Read More

FBI details worst social networking cyber crime problems
The FBI has in the past two years seen a major uptick in the use social networking accounts such as Facebook and MySpace for cyber crime and today it detailed that problem to the House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security. Read More

Black Hat gets its video feed hacked
A security expert found a way to catch the talks at Black Hat for free, thanks to bugs in the video streaming service used by the security conference. Read More


WHITE PAPER: HP

ESG: Business Value of Reservationless Storage Capacity
This report explores the value of some exciting new storage technologies which are collectively known as "reservationless storage." ESG Lab hands-on testing of the HP StorageWorks product line and analysis are used to quantify the business value of reservationless storage. Read Now

U.S. should seek world cooperation on cyber conflict, says ex-CIA director
The U.S. needs to consider working with other leading nations to develop rules of engagement in cyberspace, retired general and former director of the CIA Michael Hayden said during a keynote address at the Black Hat conference here on Thursday. Read More

Researchers tout glass invisibility cloak
Using magnetic resonance technology and glass material, a team of researchers Michigan Tech and Penn State says they can create a cloak that will make objects invisible to human eyes. Read More

FBI rings organizers over Defcon contest
A Defcon contest that invites contestants to trick employees at U.S. corporations into revealing not-so-sensitive data has rattled some nerves. Read More


WHITE PAPER: HP

HP Business Value of EVA Storage Virtualization
This Edison Group report is an independent assessment of the architecture and business benefits of HP StorageWorks Enterprise Virtual Array (EVA). Learn how EVA enables access to the storage in a single array by numerous hosts, tiered storage within the array to different types of drives and better performance than non-virtualized systems. Read Now.

Best practices for cleaning up your firewall rule base
After years of use, the rule bases that drive your network firewalls get unwieldy -- clogged with expired, obsolete, duplicative and conflicting policies. For better performance, stronger security and compliance with regulations, you'll want to clean up those rule bases. In this article, technical experts and customers of Tufin Technologies, a firewall management provider, offer their best practices for cleaning your firewall rule base, either manually or with tools that automate the process. Read More

Microsoft's bug reports fail to produce prompt patches
The Microsoft Vulnerability Research program said Wednesday that third party developers have patched less than half the bugs it reported to them over the past 12 months. Read More

X Prize opens $1.4M competition for technology to rapidly clean up oil spills
As expected, X Prize Foundation today announced a $1.4 Million competition for advanced technology to help clean up devastating oil spills like the one currently Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. 'Unhackable' Android phone can be hacked
  2. ATM hack gives cash on demand
  3. Black Hat gets its video feed hacked
  4. Happy SysAdmin Day (despite the pay)
  5. FBI rings organizers over Defcon contest
  6. WPA2 vulnerability found
  7. Microsoft's 2010 software 'most complicated lock-in decision in years'
  8. Microsoft: Gmail like a Jaguar with 'vinyl seats'
  9. Bad guys could read RFID passports at 217 feet, maybe more
  10. New Zealand pizza lovers suffer information theft from Hell

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: