Wednesday, September 08, 2010

Turning IAM data into intelligence

Microsoft targets high schoolers with newest entry-level cert | Enterprise risk management: Get started in six steps

Network World Security: Identity Management

Forward this to a Friend >>>


Turning IAM data into intelligence
Gartner's Earl Perkins (research vice president in the security and privacy team) recently blogged about establishing a relationship between identity and access management, and business intelligence. Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

WHITE PAPER: Symantec

Backup and Disaster Recovery eGuide
In these articles, Network World and its sister publications CIO, Computerworld, CSO and InfoWorld lay down the groundwork and explore the latest tips and technologies for no-fail corporate data backup and disaster recovery. Get your copy now!

Microsoft targets high schoolers with newest entry-level cert
With school back in session, Microsoft is looking to drum up interest for its newest entry-level certification program geared for students as young as high school. The program, announced in July, is dubbed the Microsoft Technology Associate certification. Schools sign up to be providers by buying a license that allows them to administer up to 1,000 exams per year. Read More

Enterprise risk management: Get started in six steps
Let's say your organization doesn't have a formal enterprise risk management program. If you're at a big company, ERM might seem daunting because of silos, inertia and so on. Read More

Microsoft investigates two-year-old IE bug
Microsoft is looking into a long-known vulnerability in Internet Explorer (IE) that could be used to access users' data and Web-based accounts. Read More


WEBCAST: Meraki

Why Enterprise WiFi Belongs in the Cloud
Effective management is key to wireless success. Join this live Webcast to hear how cloud-controlled wireless management provides the security, remote administration and reliability resource-constrained IT departments require. See real-world examples of organizations that have successfully deployed enterprise WiFi in the cloud. Sign up now!

Hacking a simple access control system
I was recently asked to create a quick solution for a Web site that needed to allow each guest invited by snail mail to enter a unique access code on a Web site to access a registration form for an event. The reason for not using name/password access control was that the organizers wanted to keep it as simple as possible for the guests and felt that having them enter just one number would be the best plan. Read More

Spammers exploit second Facebook bug in a week
Facebook today said it has fixed the bug that allowed a spamming worm to automatically post messages to users' walls earlier this week. Read More

Electric power industry as critical infrastructure
The widespread and increasing use of Supervisory Control and Data Acquisition (SCADA) systems for control of energy systems provides increasing ability to cause serious damage and disruption by cyber means. The exponential growth of information system networks that interconnect the business, administrative, and operational systems contributes to system vulnerability. Read More


WEBCAST: Akamai Technologies

Increase Download Completion Rates
Join IDC for this live Webcast as new research on Electronic Software Delivery is revealed. Find out how to effectively monitor and deliver small and large downloads to ensure end user success and satisfaction. And because it's live, you can ask the experts questions specific to your environment. Register Today.

12 Ways the Tech Industry Is Screwing You
You can't install the apps you want on your smartphone. You can't play the movies you bought on your PC. You can't even walk into a store without getting upsold, enrolled, restocked, and recalled. Welcome to the world of tech in 2010, where your phone doesn't work--and companies tell you that "you're holding it wrong." Read More

Police terror trainers lose USB stick in street
The curse of the unencrypted memory stick has stuck Manchester Police, which has suffered embarrassment as a drive containing apparently sensitive information was found lying in the street. Read More

Can a Relative or Roommate Spy on Me?
If you're both adults, can someone you're living with spy on your Internet habits? nikkiraz asked the Networking forum. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Are you the corporate geezer?
Our first Geezer Quiz in 2009 has been so popular that we've created this new set of questions that will test your memory and perhaps also bring on a wave of nostalgia for the days of minicomputers, X.25 and token ring. Keep score and see how well you do at the end. Enjoy!

The hottest virtualization products at VMworld
With VMworld kicking off in San Francisco, this is one of the biggest weeks of the year in the virtualization industry. VMware, Citrix, EMC and many other companies are releasing new virtualization technologies or adding virtualization capabilities to existing products. Here's a roundup of what's being announced this week.

MOST-READ STORIES

  1. Burning Man's open source cell phone system could save the world
  2. Only 5 (all women) of 135 pass Defcon social engineering test
  3. Open source: No one is working for free
  4. More than 1 in 10 Mozilla bug finders turn down cash
  5. Next gen Apple iPad to add FaceTime video calling?
  6. The most dangerous jobs in technology
  7. 11 funny UK sights on Google Street View
  8. Cisco, Verizon power massive IP net at new Meadowlands stadium
  9. 6 useful Wi-Fi tools for Windows
  10. iPhone 4 Wi-Fi proves a challenge for university

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment