Wednesday, October 27, 2010

Keeping the cloud within reach

Cloud services raise security, privacy concerns, experts say | Burning question: How can security risks be mitigated in virtualized systems?

Network World Security: Identity Management

Forward this to a Friend >>>


Keeping the cloud within reach
In looking back 10 years to what was in this newsletter in October 2000 I see that it was the first time I mentioned a phrase which, for many years, I tried to repeat as often as possible when talking about directories and their use by programmers. But as we approach the age of cloud-based services, the phrase is equally applicable to identity services and their use by programmers. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Iron Mountain

The Concise Guide to eDiscovery
This paper will provide an introduction to the key areas involved in developing an e-discovery strategy and to help organizations become better prepared for the rigors of the e-discovery process. Read Now.

Cloud services raise security, privacy concerns, experts say
A move toward more and more services in the cloud is inevitable, but vendors still need to focus on security, and the U.S. government needs to rewrite privacy laws to protect cloud customers, a group of experts said Tuesday. Read More

Burning question: How can security risks be mitigated in virtualized systems?
Virtualization poses storage, VM sprawl and security challenges. Read More

Cyber war, cyber espionage and your network security
Cyber-rattling by military fuels ongoing debate and struggle for controlA story by Seymour Hersh in The New Yorker lays out the competing interests at work to determine future responsibility for securing the nation's critical electronic infrastructure, including power grids and the Internet. As framed by Hersh, much of the debate hinges on drawing -- and blurring -- distinctions between cyber espionage and so-called cyber war. From the article: Read More


WHITE PAPER: Iron Mountain

Email Archiving Deep Dive
Mail servers continue to deal with ballooning message volumes and management challenges. Email archiving software provides a viable solution, particularly when granular government regulations apply. Learn More Now.

Boeing adopts NASA software to boost airline fuel efficiency
NASA algorithms take into account wind other issues to reduce flight timesNASA today said Boeing had adopted software the space agency developed to boost fuel savings. Read More

Targeted attacks rise, retail sector under siege
Targeted attacks via fraudulent and dangerous e-mail are on the rise, according to a Symantec report published today. Read More

Skeptical Shopper: E-Coupons May Track Spending Habits
The advent of online coupons has made shopping and saving that much easier. In an earlier era, people spent their Sunday mornings clipping coupons out of the newspaper. Now, you can download coupons from dedicated sites like Coupons.com or Ebates.com, or even social networking sites like Facebook and LinkedIn. But this convenience carries certain privacy risks: Some companies track consumer spending habits based on the coupons those consumers use. Read More


WHITE PAPER: Alcatel-Lucent

Alcatel-Lucent 7750 Service Router
Looking for routers that offer the scalability to extend your reach with cost-effective, feature-rich platforms that consolidate and deliver the business, residential and mobile services your customers demand? For a limited time, introductory kits are available for the newest additions to the Alcatel-Lucent 7750 SR portfolio. Read Now

Intego highlights iOS 4.1 iPhone security flaw
A new iOS 4.1 flaw has been spotted that could compromise Apple iPhone users. Read More

.Com deemed the riskiest top-level domain, wrests title from Cameroon
The .com domain is the riskiest in terms of containing code that can steal passwords or take advantage of browser vulnerabilities to distribute malware, according to security vendor McAfee. Read More

SecTor 2010: Why security is the enemy of privacy
Some might expect security to be the answer for privacy protection, but it's often part of the problem. Tracy Ann Kosa, a privacy impact assessment specialist with the government of Ontario, explains why at SecTor 2010. Read More

E-crime Now More Common Than Real Crime
If there was any doubt about the popularity of electronic dupery, it should be put to rest with a report on global fraud released the week by the risk management consulting firm Kroll. For the first time since 2007, when the company began putting together its annual survey on crime, electronic fraud surpassed physical scams as the most common form of fraud in the world. Read More

Ozzie's 'doomsday' memo warns Microsoft of post-PC days
Departing Microsoft exec Ray Ozzie has issued a communique expanding on his 2005 call for Microsoft to jump on the cloud or perish. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Open source report: Ubuntu moves away from GNOME
  2. Google TV teardown a letdown
  3. 25 new IT companies to watch
  4. Firefox add-on Firesheep brings hacking to the masses
  5. Cisco FabricPath enables faster, flatter data center networks
  6. Buzzblog: Why IPv6? Vint Cerf keeps blaming himself
  7. 25 hot products from new IT companies
  8. Burning questions: virtualization
  9. 4G defined: WiMAX and LTE don't qualify
  10. Broadband stimulus brings WiMAX to rural U.S.

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment