Search This Blog

Monday, October 04, 2010

Book, white paper tackle IdM issues

Zeus Botnet Bust Shows Malware is All about Money | Introducing the FBI's Zeus Trojan crime ring most wanted poster

Network World Security: Identity Management

Forward this to a Friend >>>


Book, white paper tackle IdM issues
There's a new book and a new white paper I want to tell you about today, and both should be of interest to most of you. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: NetApp

Storage Buying Criteria for Shared Virtual Infrastructure
You can't make the best storage decisions for your business if you're not asking the right questions. This new RFP template makes it easy. It reflects today's IT reality and includes the key criteria to consider so you can position your organization for the future. Learn more!

Zeus Botnet Bust Shows Malware is All about Money
Authorities in the United States, along with law enforcement partners around the world, issued indictments and swooped down to arrest dozens in connection with a malware scam used to steal millions of dollars from victims' bank accounts. The charges against the Zeus botnet operation show just how pervasive the malware threat is, and how lucrative it can be for cyber criminals. Read More

Introducing the FBI's Zeus Trojan crime ring most wanted poster
FBI tackles huge cyber crime investigation Ah their parents must be proud. In one of the largest cyber criminal cases the FBI has ever investigated, the crime fighting agency today released a package of information about the bust this week of an alleged group of criminals that targeted the accounts of medium-sized companies, towns, and even churches. Before they were caught, members of the theft ring managed to steal $70 million, the FBI stated.... Read More

Why did Stuxnet worm spread?
Stuxnet's inability to stay stealthy may be fall-out from a failure to hit its intended targets last year, security researchers said today. Read More


WHITE PAPER: Emerson Network Power

Precision Cooling vs. Comfort Cooling
Extreme temperature and humidity variations can damage computer systems and shorten equipment life. This eBook highlights the differences between precision air conditioning systems and building air conditioning systems, comparing energy efficiency and annual operating costs. Read Now

Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.
Court documents released on Thursday related to indictments over a massive international financial cybercrime operation provide a fascinating -- if scary -- glimpse into how the crooks operated within the U.S. Read More

In Security Outsourcers We Trust
The push to shrink security staff means more companies are outsourcing security functions to MSSPs, according to this year's Global Information Security Survey. Read More

How to Keep Your Kids Safe on Facebook
Boasting 500 million users worldwide and still growing, Facebook is now ubiquitous. Because of its popularity, minors have jumped onto the social media bandwagon, too, and they use networking the same way adults do--to share pictures, connect with friends, organize events, and play social games. And that can be a problem. Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Report: India says BlackBerry message tracking does not work
India's Department of Telecommunications (DOT) is not satisfied with the access Research In Motion (RIM) is providing to security agencies for interception of communications on both its instant messenger and enterprise services, according to a report on Friday in The Economic Times, an Indian daily. Read More

Debriefing: The 21st-century CSO skills challenge
Security skill 1 Read More

IT industry warned of advanced persistent threats
Singapore's security industry has been strongly urged to re-think the way IT security architectures are designed and built, and to devise strategic solutions to better protect organisations. Read More

The InfoWorld expert guide to Windows 7 security
How to configure Microsoft's new Windows operating system to beat malware and keep data secure Read More

Microsoft's Security Essentials running on 31 million PCs
Microsoft's free antivirus software, Security Essentials, has been installed on 31 million PCs in its first year, the company has announced. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Zeus botnet bank thieves were careless with own security
  2. Is Stuxnet an Israeli-invented attack against Iran?
  3. Many Android apps leak user privacy data
  4. Google is world's most attractive employer; Microsoft drops to No.7
  5. Zeus trojan bank-theft scheme extends to U.S.
  6. Cisco eats its own IPv6 dog food
  7. Top 10 funniest Internet memes
  8. Microsoft's Security Essentials running on 31 million PCs
  9. Professionals: Don't use Facebook and Twitter
  10. HP spins CEO carousel, picks wrong horse in Apotheker

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: