Search This Blog

Wednesday, September 15, 2010

Disappearing identity providers pose problem

Siemens: Stuxnet worm hit industrial systems | Facebook and Twitter banned by Pa. college

Network World Security: Identity Management

Forward this to a Friend >>>


Disappearing identity providers pose problem
Former Network World colleague John Fontana is now writing about IdM issues for Ping Identity. He recently commented upon an issue that may arise more and more in the future as Identity Providers (specifically OpenID Identity Providers) disappear. Read More


WEBCAST: Meraki

Why Enterprise WiFi Belongs in the Cloud
Effective management is key to wireless success. Join this live Webcast to hear how cloud-controlled wireless management provides the security, remote administration and reliability resource-constrained IT departments require. See real-world examples of organizations that have successfully deployed enterprise WiFi in the cloud. Sign up now!

WEBCAST: NeuStar, Inc.

Load Testing: Best Practices to Ensure Holiday Success
The holidays drive more traffic to your website and have great revenue potential, but have you done everything you can to make the most of the season? There are only a few months left until the rush begins. Making sure you site is ready requires planning and testing – starting now. View Now

Siemens: Stuxnet worm hit industrial systems
A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens. Read More

Facebook and Twitter banned by Pa. college
Harrisburg University provost Eric Darr wants to know if his students can live without Facebook, Twitter, instant messaging and other social networks for an entire week. Read More

10 steps to easier access management
NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week. Read More


WEBCAST: Akamai Technologies

Increase Download Completion Rates
Join IDC for this live Webcast as new research on Electronic Software Delivery is revealed. Find out how to effectively monitor and deliver small and large downloads to ensure end user success and satisfaction. And because it's live, you can ask the experts questions specific to your environment. Register Today.

Seagate's encrypted hard drive gets security boost
Seagate's Momentus Self-Encrypting Drive (SED) has become the first encrypted laptop hard drive to get the critical FIPS 140-2 certification that the company hopes will finally help boost its sales to US and Canadian government organisations. Read More

Mozilla halts Firefox security updates
Mozilla has temporarily stopped providing security updates to its Firefox browser as engineers investigate a bug that has caused some computers to crash. Read More

Cloud providers working on ways to prove they warrant trust
Finding a way to verify security within cloud provider networks is essential but won't be easy, a cloud security expert told attendees at the Security Standard conference. Read More


WEBCAST: Palo Alto Networks

60 Minutes: The Future of the Perimeter
Join two pioneers in network security: Nir Zuk and Marcus Ranum, for what promises to be a very lively discussion on the future of the network perimeter. As applications and users move in and out of the enterprise network, what happens to the network perimeter as we know it? Does it go away? Evolve? How should organizations address these changes? Sign up now!

Researchers clash over possible return of Google attackers
Experts disagree on whether a bug in Adobe's Reader PDF was caused by the same Chinese group that hacked into the systems of Google and other major companies late last year. Read More

CipherOptics debuts variable-speed encryptors
CipherOptics announced an encryption appliance that can be adjusted to work at speeds between 3 Mbps and 1 Gbps. Support for variable speeds is a major change, since customers in the past had to buy new hardware to achieve higher speeds. Read More

Security absurdity: US in sensitive information quagmire
Protecting and classifying sensitive information such as social security numbers shouldn't be that hard, but perhaps not surprisingly the US government has taken complicating that task to an art form. Read More

DARPA looking for extreme wireless interference buster
Researchers at the Defense Advanced Research Projects Agency will this month begin looking for technology that will let wireless communications work even through the most extreme and nasty interference. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

22 Best Android Apps
Here are the top productivity tools, utilities, and games for smartphones based on Google's Android OS.

MOST-READ STORIES

  1. Juniper to buy Belden's Trapeze, sources say
  2. Security absurdity: U.S. in sensitive information quagmire
  3. Ultimate guide to the flat data center network
  4. Is your cell phone a router?
  5. Microsoft issues service credits after cloud outage
  6. Newspaper demonstrates limitation of iPad
  7. Hidden secrets in the Cisco ASA
  8. Why Android is bad for business
  9. 802.11n Wi-Fi making huge impact 1 year after standard ratified
  10. Cisco bolsters Nexus, Catalyst switch lines

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


3 comments:

Anonymous said...

When someone writes an paragraph he/she keeps the plan
of a user in his/her mind that how a user can be aware of it.
Therefore that's why this piece of writing is outstdanding. Thanks!

my homepage - Accelerometer

Anonymous said...

Howdy! Do you use Twitter? I'd like to follow you if that would be okay. I'm absolutely enjoying your blog and look forward
to new updates.

Here is my site Low-Temperature Mounting Wax

Anonymous said...

Pretty component of content. I simply stumbled upon your
blog and in accession capital to assert that I acquire in fact
enjoyed account your weblog posts. Anyway I'll be subscribing in your feeds and even I fulfillment you get right of entry to consistently rapidly.

My blog post ... Mortgage loan