Wednesday, November 17, 2010

The cloud from different angles

Network World Security: Identity Management - Newsletter - networkworld.com
Bots and social media engagement | Encryption adoption driven by PCI, fear of cyberattacks

Network World Security: Identity Management

Forward this to a Friend >>>


The cloud from different angles
We seem to have spent an inordinate amount of time on cloud computing the past few issues, but there's one more announcement (at least) that I want to bring to your attention before moving on. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

VIDEO: Alcatel-Lucent

The future with an Application Fluent Network
See how an Alcatel-Lucent Application Fluent Network can help you build a high performing, low complexity converged network. No matter what industry you're in, get the performance you need to meet your growing network demands. Learn more

Bots and social media engagement
As people in the online world become increasingly connected, the reasons to engage with social media expand with remarkable speed. Just consider that only a couple of years ago the leading edge of the Twittersphere was the Los Angeles-based mobile Kogi Korean BBQ which was using Twitter to drive sales … now, there are scores of similar players all over America using the same strategy. Read More

Encryption adoption driven by PCI, fear of cyberattacks
A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards. Read More

Google Chrome cited tops 'Dirty Dozen' vulnerable apps list
The Google Chrome browser has earned the dubious distinction of being named the most vulnerable application on the "Dirty Dozen" list of 12 applications with the most discovered software flaws requiring security updates and notifications from January through mid-October. Read More


WHITE PAPER: IBM

A Journey to Adaptive Master Data Management
This white paper describes the business drivers for MDM and value that can be derived through the master data management journey, illustrates the characteristics of an adaptive MDM solution, and provides an overview of the IBM MDM portfolio. Read Now!

A is for Authentication: ABCs of IT [video]
Network World's resident puppet instructors, I.T. Jinglehopper and Jackson, are back to explain the IT term authentication, the factors of authentication, and what it means for the world of data security. Read More

Going beyond enterprise architecture 101
Penn State set to prepare future enterprise architects Bringing the next generation of enterprise architects up to speed won't be an easy task. While most experts agree that the job is a critical one, given the corporate emphasis building business infrastructure in the most technically efficient way, training these future experts has proven difficult. Read More

FTC readies national privacy framework
In an era of massive collecting and selling of personal data, the Federal Trade Commission is preparing to issue a 'privacy framework' that will include guidance about best practices when it comes to personal data privacy. Read More


WHITE PAPER: Iron Mountain

Online Server Data Protection: A Fully Managed Cloud Service
Read this data sheet to learn how Iron Mountain's LiveVault® helps enterprises achieve cloud data protection and long term off-site retention, remove complex, daily backups, store data securely off-site, and deliver point-in-time recovery. Read Now

Adobe patches under-attack Reader bug
Adobe today issued an emergency update for its popular Reader PDF software that patched two critical vulnerabilities, including one attackers have exploited for weeks. Read More

Hackers, spammers will target Facebook Messages, say experts
Facebook's revamped Messages will be a very attractive target for spammers, scammers and malware makers, security experts said today. Read More

Is there free stuff for online security? Yes!
Security software is a real free-for-all these days. Read More

FBI site hits 2 million online criminal complaints
FBI's Internet Crime Complaint Center logs 2 millionth complaintsNot too sure this is something to be proud of, but the FBI's Internet Crime Complaint Center (IC3) today said it logged its 2 millionth consumer complaint. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. People who stand up for privacy could be classified as mentally ill
  2. Google Chrome tops 'Dirty Dozen' vulnerable apps list
  3. Microsoft breaks petaflop barrier, loses Top 500 spot to Linux
  4. Juniper looks to one-up Cisco again in core routing
  5. U.S. building next wave of supercomputers
  6. Traveler to TSA: If you touch my junk, I'll have you arrested
  7. Lack of overheating protection in Windows Phone 7 HTC Surroun
  8. Microsoft Lync: What you need to know
  9. 10 offbeat gift ideas: 2010 edition
  10. Apple promises unforgettable something or other tomorrow

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment