Wednesday, December 15, 2010

Will small identity management firms thrive in 2011?

Huge EFF Win: Fourth Amendment Protects Email Privacy | Microsoft ends record security year with huge Patch Tuesday

Network World Security: Identity Management

Forward this to a Friend >>>


Will small identity management firms thrive in 2011?
We're almost to the end of 2010 – how time does fly, especially as we get older. So over the next few weeks we'll gaze into the crystal ball to see if we can glean what's coming in the new year. I'll hold off on my own prognostications, but a slew of industry insiders and knowledgeable readers have stepped up to provide grist for the identity mill. Read More


RESOURCE COMPLIMENTS OF: VeriSign, Inc.


VeriSign® SSL Certificates now come with new features! Learn more!

WHITE PAPER: Emerson Network Power

Ten Steps to Increasing Data Center Efficiency
You can't manage what you don't monitor. That's why infrastructure monitoring is essential to data center optimization. Emerson Network Power outlines what you should be monitoring, how to monitor it and the results you can expect. Take the proactive approach to infrastructure monitoring. Read now

Huge EFF Win: Fourth Amendment Protects Email Privacy
The U.S. Appeals Court ruled that stored email is protected by the Fourth Amendment. This federal decision will hopefully urge Congress to update the law so when the feds secretly demand a user's email, but do not have probable cause, an email provider can safely say, "Oh yeah? Come back with a warrant."In a tremendous landmark decision, the U.S. Appeals Court ruled that stored email is protected by the Fourth Amendment. Read More

Microsoft ends record security year with huge Patch Tuesday
Microsoft's security team broke all sorts of records for issuing patches this year, and 2010's final Patch Tuesday was the biggest one of all. Read More

Symantec updating data-loss prevention suite
Symantec plans to have an updated version of its data-loss prevention suite out by mid-2011 that will add advanced machine-learning capability to simplify data classification and keyword definitions of documents to ease administrative chores associated with properly setting up DLP controls. Read More


WHITE PAPER: Sybase

IT Guide to Managing Personal Devices in the Enterprise
You can't avoid it any longer: Developing a strategy for managing employees' personal mobile devices. Get this paper and learn how to create a more secure and manageable mobile enterprise. It's yours, compliments of Sybase. Read More

CIO gets six years for embezzlement scheme
The former chief information officer at a large U.S. automobile processing company has been sentenced to nearly six years in prison for embezzling more than $500,000 from the company by faking expense reports and reselling company equipment. Read More

Gawker hack analysis reveals incredibly weak passwords
The most popular password among nearly 400,000 exposed by the Gawker hack was "12345," according to a security firm's analysis. Read More

What to do if your Gawker password was violated
If you think your Gawker account has been compromised by this weekend's attack and you want to cancel it, you can't. Read More


WHITE PAPER: Google Postini

Top 5 Drivers for Email Archiving
This paper demonstrates the various reasons to archive email and other electronic content. It discusses how to handle objections, highlights the five key business drivers for archiving, and provides quantifiable justifications that show cost savings and risk reduction. Read now!

Huawei Symantec ready to compete in North America
The Chengdu, China-based joint venture started in 2008 by China's Huawei networking company and U.S. storage and security company Symantec is now primed to take on the competition in North America, its general manager says. Read More

EU agency serves up smartphone security warning
Smartphone security needs to shape up pretty fast if it is to avoid the mistakes that turned the PC into a global crime platform, a new report from EU security agency ENISA (European Network and Information Security Agency) has said. Read More

Internet hit by wave of fake PC 'defrag' tools
A spate of scareware apps that trick users into buying useless hard disk repair tools appears to be part of a concerted campaign to push fake 'defrag' software, a security company has said. Read More

BlackBerry 6: Wipe Your Smartphone, Restore Factory Settings
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc. Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. Goodbye Internet, we hardly knew ye?
  2. Gawker hack is bad news for us all
  3. Apple quietly drops iOS jailbreak detection API
  4. Favorite cheap network tools
  5. Cisco's most recent acquisition gains it network management
  6. Jackass IT: Stunts, idiocy and hero hacks
  7. Gawker hack analysis reveals incredibly weak passwords
  8. Nortel wireless patents have Apple, Google battling again
  9. Microsoft, Google spread malware hidden in holiday ads
  10. Gmail users unexpectedly spend a weekend without e-mail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment