Search This Blog

Wednesday, November 03, 2010

Partitioning is important component of identity services

Researchers tout unique automated firewall fault fixer | Father of Firesheep fires away after wild week in WiFi security

Network World Security: Identity Management

Forward this to a Friend >>>


Partitioning is important component of identity services
We've been talking about what an identity service needs in order to be considered both pervasive and ubiquitous. That is, to be "available anywhere and every time we want to use it" as well as "available everywhere and any time we want to use it." Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WEBCAST: Aruba Networks

Managing a Global Wireless LAN-Best Practices from Intel IT
In this webinar, Intel IT explains how they overcame challenges associated with managing their global WLAN across 150 Intel sites in 63 countries, supporting more than 45k simultaneous users every day. Intel highlights best practices for managing a global WLAN and how they cut support costs. Learn more!

Researchers tout unique automated firewall fault fixer
Automated policy tool can ease admin burden of managing firewallsResearchers will next will detail a tool they say will automate changes and significantly reduce the administrative upkeep of firewalls. Read More

Father of Firesheep fires away after wild week in WiFi security
Firesheep, the Mozilla Firefox add-on released about a week ago that lets you spot users on open networks visiting unsecured websites, has given creator Eric Butler more than his 15 minutes of fame. Read More

Sony BMG rootkit scandal: 5 years later
The revelation 5 years ago that Sony BMG was planting a secret rootkit onto its music customers' Windows PCs in the name of anti-piracy is seen now as one of the all-time significant events in IT security history. Read More


WHITE PAPER: HP

Securing Virtualized Data Centers
Understand the real need for security solutions that can address the reality of expanding virtualization. You will also learn how HP TippingPoint's secure virtualization framework allows organizations to gain control of the virtual environment by introducing in-line security policy enforcement. Read Now

In-Depth Look at Boonana Malware
Last week a malware threat emerged that impacted both Windows and Mac OS X systems. To be fair, the attack is more social engineering than PC exploit, but it impacts Mac OS X users just the same. ESET's David Harley has written a more detailed analysis of the Boonana threat, and identified some elements that are contrary to initial reports. Read More

Sophos delights Mac users with free antivirus
Security software company Sophos has finally broken ranks and decided to offer Mac users a free antivirus product without hidden strings. Read More

Antivirus software didn't help in zero-day malware attack on power plant
When the zero-day attack known as the "Here You Have" virus hit about 500 PCs at the Salt River Project, a large public power utility and water supplier for Arizona, it turned out that the antivirus software in use provided no defense. Read More


WHITE PAPER: Array Networks

Get Control of Your Datacenter
Application Delivery Controller helps IT leverage data center technologies to quickly adapt to changing business demands. Read now!

Security laws, regulations and guidelines directory
This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Each entry includes a link to the full text of the law or reg as well as information about what and who is covered. Read More

Google Pays Cash to Hackers for Web App Security Flaws
Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps. Read More

Another Cisco cheater nabbed
Minnesota man pleads guilty to $388,000 parts scam Another Cisco cheater has been nabbed. Bloomberg Businessweek reports that a Minnesota man has pled guilty to defrauding Cisco out of $388,000 in a spare parts scam. Under a plea deal, Philip Webb of Brooklyn Park, MN., this week pled guilty to one count of mail fraud for selling Cisco replacements parts online. He received the parts by sending Cisco secondhand gear that he claimed were defective products,... Read More

The New CISO: How the role has changed in 5 years
The role of CISO has evolved in the last five years from one of IT security administration to high-level risk management. Here are four perspectives on how and why it happened and how you can go about doing the job effectively today. Read More

Security in the electric power industry: Riptech Report of 2001
This is another in a series of articles looking at security issues in the electric power industry. Today I review a baseline report from almost a decade ago that remains important for everyone studying these issues. In light of the Stuxnet worm attacks on tens of thousands of Siemens supervisory control and data acquisition (SCADA) systems around the world. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Sony BMG rootkit scandal: 5 years later
  2. Apple iPhone bug causes Europe to wake up late
  3. Is it legal to use Firesheep at Starbucks?
  4. The 25 worst high-tech habits (and how to fix them)
  5. Google's top 10 best (and worst) innovations of the year
  6. Steve Jobs' business card from 1979
  7. 8 cool features of Chrome 8 beta
  8. Air Force bounces Windows XP, goes all-in for Windows 7
  9. TSA: Show us your body or we'll feel you up
  10. Microsoft lures developers with Windows Azure

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: