Search This Blog

Wednesday, August 18, 2010

Data breach demonstrates need for access control policies

HP to buy vulnerability specialist Fortify Software | Who are these people who think cybersecurity experts are crying wolf?

Network World Security: Identity Management

Forward this to a Friend >>>


Data breach demonstrates need for access control policies
A Canadian tax collector illegally mined Canada Revenue Agency data files for years seeking potential clients for her side business, pointing up the need for access controls. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
See how you can transform customer information and feedback into actionable results. Read now!

WHITE PAPER: Qwest

Infrastructures for Innovation
Nearly nine out of ten senior IT and business executives say that data, voice and network services can be leveraged to drive innovation, facilitating remote access to critical applications and speeding up customer service. They can generate immediate cost savings by eliminating the cost of maintaining separate voice lines. Read more!

HP to buy vulnerability specialist Fortify Software
Hewlett-Packard says it will buy Fortify Software, which makes tools to find software vulnerabilities and compliance software, for an undisclosed amount. Read More


WHITE PAPER: Qwest

The Three Ps of Evaluating Managed Network Services
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

Who are these people who think cybersecurity experts are crying wolf?
Just because security experts work for security vendors, that doesn't mean their warnings should be taken less seriously. Read More


WHITE PAPER: Tripwire

Cyberwar Threats: New Security Strategies for Governments
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

DOJ won't file charges in school webcam spying case
Fedeal prosecutors say they can't find criminal intent by a Pennsylvania high school that issued student laptops with spy-cam capabilities. Read More

GPUs: Powering Your Gaming and Cracking Your Passwords
Researchers at the Georgia Tech Research Institute have demonstrated that off-the-shelf GPUs (the same that power the video card in your PC) are better at cracking passwords than had previously been thought, according to a BBC report. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. EFF warns of untrustworthy SSL, undetectable surveillance
  2. Microsoft and Google fight over e-mail, but agree on $5 inboxes
  3. Riverbed CEO: Cisco can have Layer 2 and 3, we'll take 4 through 7
  4. Malicious widget hacked millions of Web sites
  5. Social networks leak your information, study says
  6. Five billionth device about to plug into Internet
  7. "Help, I am stranded" scam haunting social networks
  8. How to roll out full disk encryption on your PCs and laptops
  9. Friday the 13th, Part II: Oracle officially ends OpenSolaris
  10. Google Street View disasters

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: