Wednesday, December 08, 2010

Classified documents: Where’s the encryption and user control?

Mobility drives IPv6 urgency | Card makers hope to upset transit card security status quo

Network World Security: Identity Management

Forward this to a Friend >>>


Classified documents: Where's the encryption and user control?
If people learn from the WikiLeaks fiasco - apparently triggered by a single Army private - it may be a boon for the identity and access management industry. Read More


RESOURCE COMPLIMENTS OF: VeriSign, Inc.


VeriSign® SSL Certificates now come with new features! Learn more!

WEBCAST: Iron Mountain

Secure, automatic protection for all your server data
Your data is valuable—too valuable to risk losing through unreliable backup methods. Iron Mountain's LiveVault offers secure, easy, automated online backup for servers throughout your organization. Watch this webcast to learn how to eliminate the risks of tape-based backup while gaining scalability and fast, reliable recovery. View now

Mobility drives IPv6 urgency
At the rate mobile devices are being created – not only for user access, but for wireless machine-to-machine communications, too – there won't be any IPv4 addresses left, so soon they'll support only IPv6 addresses. Read More


WHITE PAPER: IBM

Defining a Framework for Cloud Adoption
Read this white paper to understand IBM's framework for cloud computing adoption which establishes common definitions, delivery models and services and identifies key aspects required for a successful cloud computing execution. Read Now

Card makers hope to upset transit card security status quo
Two smartcard makers and two chip makers hope that an open standard for public transit cards will help them make gains in that market. Read More


WHITE PAPER: Google Postini

Top 5 Drivers for Email Archiving
This paper demonstrates the various reasons to archive email and other electronic content. It discusses how to handle objections, highlights the five key business drivers for archiving, and provides quantifiable justifications that show cost savings and risk reduction. Read now!

Fix to Chinese Internet traffic hijack due in January
Policymakers disagree about whether the recent Chinese hijacking of Internet traffic was malicious or accidental, but there's no question about the underlying cause of this incident: the lack of built-in security in the Internet's main routing protocol. Read More

Regulatory compliance hogs security pros' attention
One out of every two IT security professionals spends 50% of the work week on regulatory compliance initiatives, according to a new survey sponsored by eEye Digital Security. Read More

Security Manager: First task is to tighten up SaaS security
SaaS can be a good alternative to building applications in-house or buying them, but having too many Saas providers can be a security nightmare. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. VMware to virtualize Android smartphones for business users
  2. Retailer accused of inflating Google ranking is arrested
  3. WikiLeaks' Assange arrested in London
  4. Stop freaking out about terrorism. Did TSA miss that memo?
  5. Best and worst celebrity technology moments of 2010
  6. Unwrapping Google's Android "Gingerbread" gift
  7. iPhone customers dump on AT&T in Consumer Reports survey
  8. Feds tracking Americans' credit cards in real-time without a warrant
  9. Juniper acquires virtualization security firm
  10. New Facebook changes not a huge blow to privacy, say experts

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment