Search This Blog

Monday, November 15, 2010

Book reveals truths about the cloud

Best practices for SIEM deployments | Bugs & Fixes: Beware OS X 10.6.5 and PGP WDE protected drive

Network World Security: Identity Management

Forward this to a Friend >>>


Book reveals truths about the cloud
I've known Archie Reed for many years, since he was vice president of strategy for TruLogica back in the early years of this century. He went with that company when it was acquired by Compaq, then stayed when that organization was bought by HP, filling various roles involving identity and security until ending up, today, as HP's chief technologist for cloud security. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Websense, Inc.

Buyers Guide to Data Loss Prevention Solutions
This guide provides a list of recommended features and capabilities for buyers to consider when purchasing a DLP solution. Buyers can also use this guide to develop requests for proposals, as well as to help differentiate one vendor's products from another during demonstrations and proof-of-concepts. Read More

Best practices for SIEM deployments
The 2010 Data Breach Investigations Report published by the Verizon Business RISK Team has a shocking statistic about the effectiveness of log analysis in helping organizations discover that they've been a victim of a security breach. According to Verizon, logs are available in nearly 90% of the breaches they've investigated, but effective in discovering the breach less than 5% of the time. This article outlines some best practices for deploying a security information event management (SIEM) solution to put those logs to better use. Read More

Bugs & Fixes: Beware OS X 10.6.5 and PGP WDE protected drive
If you are using PGP Whole Disk Encryption, beware of updating to Mac OS X 10.6.5. PGP Technical Support has issued the following alert: Read More


WEBCAST: Websense, Inc.

Securing the Social Web
Organizations around the world are racing to take advantage of social networking and media like Facebook, LinkedIn, and YouTube. Along with these new resources, comes new risk as user-generated content circumvents traditional security technologies such as antivirus and URL filtering. View Now

Obama may toughen Internet privacy rules, report says
The Obama administration is reportedly considering plans to step up policing of Internet privacy issues and to establish a new position to direct the effort. Read More

Google, Facebook duke it out over user data
Internet giants Google and Facebook have been having a war of words this week over user data portability. Read More


WHITE PAPER: Quantum Corporation

Securing Data Stored On Tape With Encryption
With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Read Now

Apple smashes patch record with gigantic update
Apple this week patched a record 134 Mac OS X vulnerabilities, easily topping the previous record of fixing 90 flaws in March. Read More

Virus infecting phones in China costs you $300,000 a day
A virus masquerading as an antivirus application (how's that for irony?) has been infecting countless mobile phones in China. The virus lets hackers take control of the phone who then spam the phone's entire address with links that allow the virus to spread to even more phones. Read More

It's Time For A New Name for Data Loss Prevention (DLP)
Myopic industry-driven title has become obsoleteBack around 2005, DLP was the buzz term Du Jour within the information security industry. DLP was designed to find sensitive data and make sure that this data wasn't accidentally or maliciously mis-used. The most common DLP implementation was as a network gateway for filtering Layer 7 content. When a DLP devices spotted credit card numbers in an email, it simply blocked this transmission thus preventing... Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. FTC appoints cool hacker as first chief technologist
  2. Amazon regains senses, pulls pedophile how-to book
  3. Microsoft opens new front with cloud-based Windows Server
  4. Man loses $20 million after taking laptop for repair
  5. Red Hat releases RHEL 6
  6. Apple smashes patch record with gigantic update
  7. Virus infecting phones in China costs you $300,000 a day
  8. Google, Facebook duke it out over user data
  9. Windows 7 upgrades stalled by IE6 holdouts
  10. 12 amazing productivity boosters

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: