Monday, September 27, 2010

Google adds two-factor authentication to Apps

Top brands deluge customers with 'unwanted email' | Spammers hit email users with new html attack

Network World Security: Identity Management

Forward this to a Friend >>>


Google adds two-factor authentication to Apps
Google just did us all a big favor. The company has introduced two-factor authentication for Google apps. So how does this help us? And, by "us," I mean those of you and me who make our living through various aspects of identity management. Read More


WHITE PAPER: NetApp

Read More!
ESG Whitepaper talking about Windows Data Consolidation in Mid-Sized Virtual Server Environments. This paper focuses on the challenges of virtualizing Windows environments and the need to consider network storage as a part of the overall solution. NetApp and VMware's joint solution is also examined in detail. Read now!

WEBCAST: Palo Alto Networks

60 Minutes: The Future of the Perimeter
Join two pioneers in network security: Nir Zuk and Marcus Ranum, for what promises to be a very lively discussion on the future of the network perimeter. As applications and users move in and out of the enterprise network, what happens to the network perimeter as we know it? Does it go away? Evolve? How should organizations address these changes? Sign up now!

Top brands deluge customers with 'unwanted email'
PC World, JD Sports, Woolworths, Aldi, B&Q and Arcadia Group have been named and shamed as the UK brands most likely to 'spam' customers with unwanted email, according to a new analysis. Read More

Spammers hit email users with new html attack
Spammers have suddenly cranked up the use of malicious html file attachments in recent days, according to security company Barracuda Networks. Read More

Privacy Choices: Who's Watching You and Tracking Your Clicks?
Every click you make is tracking your online behavior, but PrivacyChoice provides privacy tools to help you control who's watching and tracking you.Every click you make is tracked by ad companies who tend to collect information on your behavior and then sell it to other advertisers who want you to be their target too. Maintaining online privacy can be difficult and time-consuming, but excellent privacy tools provide hope and control. Read More

US backs 10 Smart Grid projects with $34M to bulk up cybersecurity
Department of Energy gets behind cybersecurity projects to protect national electric gridThe US Department of Energy today spent $30.4 million on cybersecurity projects it says will go a long way towards addressing the nation's electric grid cybersecurity issues. Read More


WHITE PAPER: NetApp

Storage Buying Criteria for Shared Virtual Infrastructure
You can't make the best storage decisions for your business if you're not asking the right questions. This new RFP template makes it easy. It reflects today's IT reality and includes the key criteria to consider so you can position your organization for the future. Learn more!

Five federal agencies want big robot technology advances
Five federal agencies this week teamed to announce they are looking to fund innovative research and development of robotic technologies for everything from home healthcare and bomb detecti Read More

Microsoft says Google Chrome Frame doubles attack surface on IE8
Microsoft-Google browser war continuesMicrosoft is claiming that the Chrome Frame plug-in Google designed to speed up Internet Explorer will "double" the attack surface in IE8. As we reported in Network World earlier today, Google has taken the beta tag off Chrome Frame, saying the add-on for IE6, 7 and 8 will speed up Microsoft's browsers with HTML5 and advanced JavaScript technology. Read More

How the FBI is aligning with biometrics
Sept. 24, 2010 - Dr. Alice Isenberg, chief of the Biometrics Analysis Section at the FBI, talks about the FBI's lab work and integrating with the biometrics community. The speech was at the Biometric Consortium Conference 2010 in Tampa, Fla. Read More

FTC settles privacy violation claims with online data broker
Online data broker US Search sold a service that claimed to lock down private records so no one else in the world could see them. The Federal Trade Commission said any such privacy claims were false and deceptive. Read More


WHITE PAPER: Citrix Systems

Load Balancers are Dead
Gartner Research Note "Load Balancers are Dead: Time to Focus on Application Delivery" helps you understand how to replace your basic load balancing technology and focus on getting the highest availability, performance and security for your web apps. Includes key recommendations you can use. Read now!

UK survey aims to quantify prevalence of cyber stalking
A U.K. organization is conducting a survey to gauge the prevalence of cyberstalking, an undocumented problem that may be becoming increasingly prevalent. Read More

Meeting the new PCI wireless requirements
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless threats. Read More

39% of students share passwords with friends and family
Nearly four in ten web users aged 18 to 25 share passwords with friends and family, says AVG. Read More

Mobile workers pose biggest security risk
Mobile workers trigger more security alerts when they leave the office than when they do at their desks, the latest Symantec MessageLabs Intelligence Report has suggested. Read More

Man gets 10 years for VoIP hacking
A Venezuelan man was sentenced to 10 years in prison Friday for stealing and then reselling more than 10 million minutes of Internet phone service. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Facebook apologizes for worst outage in four years
  2. 'Preliminary' finding invalidates VoIP patent, says EFF
  3. Gartner: Global 'IT debt' hits $500 billion, on the way to $1 trillion
  4. Cisco refreshes SMB portfolio
  5. China's 'big hole' marks scale of supercomputing race
  6. Cisco releases critical IOS security patches
  7. ACLU report: Spying on free speech nearly at Cold War level
  8. U.S. military takes cloud computing to Afghanistan
  9. Carry an instant Windows 7 hotspot in your pocket
  10. Was Stuxnet built to attack Iran's nuclear program?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment