Search This Blog

Monday, December 06, 2010

The holy grail of PC security?

2010's biggest security SNAFUs | Corporate Executives Remain Lukewarm on Cyber Security

Network World Security: Identity Management

Forward this to a Friend >>>


The holy grail of PC security?
Monitoring user inactivity, and locking down a computer when the user forgets to, is the Holy Grail of PC security. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: NeuStar, Inc.

Holiday Readiness Guide for Ecommerce
This white paper is all about Internet Gifting Essentials as it is critical that merchants ready their sites from both a performance and selling perspective. Based on the e-tailing group's Annual Mystery Shopping Survey, highlighted Internet gifting essentials were present in three-out-of-four of the 100 websites we surveyed last holiday season. Read More

2010's biggest security SNAFUs
That old phrase SNAFU ("Situation Normal, All F---ked Up!") certainly describes our choices for 2010's top 10 security screw-ups. Read More

Corporate Executives Remain Lukewarm on Cyber Security
Only 25% of security professionals working at critical infrastructure organizations rate executive management support as "excellent"What's needed for strong cyber security? Good security policies, processes, and technology safeguards of course, but highly-secure organizations also integrate security into their corporate culture -- from new employees the the corner office. Since the proverbial buck stops at the CEOs desk, cyber security-conscious and proactive CEOs are a security professional's best friend. Read More


WHITE PAPER: Logitech

The Business Benefits of Desktop Video Collaboration
At your desktop: Advances in the quality and simplicity of affordable desktop video equipment allow organizations to tap the power of unified communications, which can significantly cut costs, increase efficiency, improve business performance and foster more collaboration, regardless of location. Read More

FBI warns of new twists on twisted hitman, handgun and adoption scams
New twists on old scams are on the rise says FBI's Internet Crime Complaint Center The FBI's Internet Crime Complaint Center's (IC3) today issued a warning about new twists on some pretty twisted scams. First up, the IC3 said the old Hitman Scam has morphed again in a nasty new way. The Hitman extortion is now targeting nannies and day care providers. FBI details most difficult Internet scams Read More

Police urge international cybercrime cooperation
International policing authorities have urged for greater harmonisation of cybercrime laws between countries to better share information and collaborate on global crime waves. Read More


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

Quantum key 'blinding' hack deeply flawed, say researchers
The 'blinding' hack of quantum key distribution (QKD) systems publicised by Norwegian researchers earlier this year was based on a seriously flawed setup of the equipment being eavesdropped upon, scientists at Toshiba's Cambridge Research Lab have said. Read More

With WikiLeaks, Amazon shows its power over customers
Amazon's decision to pull its hosting of Wikileaks underscores the risks companies face when moving to the cloud. Read More

Google, Adobe sandbox Flash for Chrome to protect users
Adobe and Google have collaborated to put the Flash Player plug-in inside a sandbox within Chrome, an effort by the two companies to better protect users from attacks. Read More

Lawmakers, companies question online do-not-track proposal
Some lawmakers and tech companies question a U.S. FTC do-not-track proposal. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Google caves in Street View 'trespassing' case, pays $1
  2. 2010's biggest security SNAFUs
  3. Is a next-generation firewall in your future?
  4. Microsoft quietly invests in IBM emulator TurboHercules
  5. From Pong to Furby, games and gadgets of holidays past
  6. So many Androids, so little time
  7. Microsoft gains cloud security certification ... six months after Google
  8. WikiLeaks.org downed by domain hosting service
  9. AVG free update bricks 64-bit Windows 7 PCs
  10. Open source IP PBX saves serious cash for Michigan CAT

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: