Monday, October 25, 2010

Rise of the cloud can be traced back a decade

How to secure iPads for corporate use | Adobe warns of Shockwave bug

Network World Security: Identity Management

Forward this to a Friend >>>


Rise of the cloud can be traced back a decade
Each month we take a look back 10 years to see what was "hot" -- at least by this newsletter's standards. Often I'm hard pressed to find something relevant to today's discussions, but October 2000 was a different kettle of fish -- lots of relevant stuff. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WEBCAST: Iron Mountain

Secure, automatic protection for all your server data
Your data is valuable—too valuable to risk losing through unreliable backup methods. Iron Mountain's LiveVault offers secure, easy, automated online backup for servers throughout your organization. Watch this webcast to learn how to eliminate the risks of tape-based backup while gaining scalability and fast, reliable recovery. View now

How to secure iPads for corporate use
When Apple's iOS 4.2 debuts next month, it will offer enough features to make the iPad tablet a device that's safe for business if IT security teams take the right steps. Read More

Adobe warns of Shockwave bug
Adobe warned Thursday of a critical bug in its Shockwave Player that affects both Windows and Macintosh PCs. Read More

Google fixes 11 Chrome flaws, debuts stable version 7
Google patched 11 vulnerabilities in Chrome on Thursday as it updated the browser to version 7. Read More


WHITE PAPER: Dell

Smart Virtualization Planning for SMBs
The list of applications that run in a virtualized environment is growing daily. This paper explains why databases, ERP, Web servers and legacy operating systems are first in line to run on VMs, why it's best to wait on real-time applications and how to determine the difference between core compatibility and configuration issues. Learn more!

One in ten websites send spam emails
One in ten websites are responsible for spam email, says Spam Ratings. Read More

FBI fires back at report critical of complex computer project
Dept. of Justice report says FBI Sentinel computer system lacks features, is over budgetLate, over budget and lacking critical components were the three main shots the Department of Justice's Office of the Inspector General (OIG) leveled at the FBI this week in a report on the agency's over-arching computer system revamp known as Sentinel. Read More

Why IPv6? Vint Cerf keeps blaming himself
Impending exhaustion of IPv4 addresses 'my fault,' he says ... regularly Are you struggling with or dreading the thought of IPv6? If so, Vint Cerf, much-decorated "Father of the Internet," wants you to know that it's OK to blame him. He certainly does so himself. In fact, he does so time and time and time again. Read More


WHITE PAPER: Pareto Networks

The Cloud-based Telework Solution
By combining a cloud-based model with user-friendly devices, Pareto Networks has pioneered a new approach to remote access with the simplicity, centralized control, visibility, and economies of scale needed for broad deployment to permanent telewokers. Read now!

Facebook ads could 'out' gay users, researchers say
Facebook users may inadvertently reveal their sexual preference to advertisers in an apparent wrinkle in the social-networking site's advertising system, researchers have found. Read More

Half of EU kids don't know how to be safe online
Half of the young children in the E.U. don't have basic Internet safety skills such as knowing how to control privacy settings or block unwanted contacts. Read More

EPIC gives Obama administration mediocre privacy grades
The Electronic Privacy Information Center has given the Obama Administration mediocre grades in its second annual privacy report card released this week. Read More

Mac users warned of growing virus threat
Attacks on the Mac are now significant enough to warrant Apple users investing in an anti-virus product, security company Panda Security said as it launched a new product that offers such protection. Read More

Technologically clueless Russian spy hired as 'IT innovator' for bank
Russian spy Anna Chapman is making headlines this week for posing provocatively in a photo spread in the Russian edition of Maxim magazine, but she equally deserves notoriety for landing a job as an IT security official in a Russian bank despite glaring gaps in her technical knowledge. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Technologically clueless Russian spy hired as 'IT innovator'
  2. 10 spooky Halloween iPhone apps
  3. Microsoft celebrates Windows 7's 1st birthday
  4. Buzzblog: Why IPv6? Vint Cerf keeps blaming himself
  5. Android vendors concede tablet market to Apple
  6. Cisco fleshes out its business video plan
  7. Red Hat CEO: Software vendor model is broken
  8. The Cisco Connection: Latest Cisco rumor: RIM?
  9. Gartner sees 'context-based computing' on the horizon
  10. Mac users warned of growing virus threat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment