Wednesday, January 26, 2011

Forrester report declares passwords insecure and notes sky is blue

Low-cost SSL proxy could bring cheaper, faster security; defeat threats like Firesheep | Google wants to hire more than 6,000 workers in 2011

Network World Security: Identity Management

Forward this to a Friend >>>


Forrester report declares passwords insecure and notes sky is blue
In what should come as no surprise to most of you, a Forrester study from December concluded that "... most companies continue to rely on the traditional username and password sign-on to verify a user's identity." And that "... those organizations are unnecessarily leaving themselves open to unauthorized access by hackers and e-criminals." Read More


ARTICLE: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Emerson Network Power

Fujitsu Achieves 100% Accurate Power Measurement
Customers come to Fujitsu for resilient, secure and low cost data center services. Learn how Fujitsu improved the accuracy of their customer billings by changing their service fee model from a sq. foot/meter metric to one that accurately measures power and cooling consumption. Read now

Low-cost SSL proxy could bring cheaper, faster security; defeat threats like Firesheep
Researchers have found a cheaper, faster way to process SSL/TLS with off-the-shelf hardware, a development that could let more Web sites shut down cyber threats posed by the likes of the Firesheep hijacking tool. Read More

Google wants to hire more than 6,000 workers in 2011
Google looking to hire all manner of employees for Chrome to Web developmentGoogle seems poised to hire more than 6,000 people this year all goes according to plan. That amazing fact was posted on the company's website by Alan Eustace, Google's senior vice president of engineering and research. Read More

US Secret Service taps video game, 3D technology for advanced security training
US Secret Service goes virtual to gain security insightsWhen it comes to preparing for all manner of security threats, the more realistic the training can be the better. That's why the US Secret Service said it has developed a software system that uses gaming technology and 3D modeling to offer high-tech training for its personnel. Read More


WHITE PAPER: BMC

Workload Automation: Helping Cloud Computing Take Flight
Learn how sending the workload into the cloud can provide faster processing while also reducing capital equipment expenditures inside the data center in this white paper. Learn More Now!

Top 10 Web hacking techniques of 2010 revealed
A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting. Read More

Apple's e-wallet won't replace the one I'm sitting on
Reports fly that iPhone 5 and iPad 2 will have Near Field Communications capabilitiesToday's flurry of reports that Apple's iPhone 5 and iPad 2 will support Near Field Communications technology has sparked yet another round of nonsense about how so-called e-wallets soon will be the death knell of the leather variety. Now no one is disputing (certainly not me) that contactless payment systems are coming to a smart phone near you. Read More

Identity and Networking
Real progress and integration in 2011For the past 15 years or so, the networking industry has been hinting at a vision with a snappy title like "identity-driven networking." I first heard this concept in the late 1990s, when Cisco came up with its own spin on this theme with an initiative called Directory Enabled Networking (DEN). The thought was that the network would query the network to enforce some kind of access control policies... Read More


WHITE PAPER: Extreme Networks

The High Performance Network for iSCSI
IT organizations have been focusing on creating a converged infrastructure to support high-performance iSCSI while allowing other applications to coexist on the network. Read now!

Forrester's 2011 security strategy recommendations
Every New Year brings an opportunity to review existing security plans and adjust strategies for the next year. And, as I participate in these conversations for 2011, a lot of similar themes have popped up. Most CISOs are struggling with the same issues, ranging from dealing with the changing threat landscape to properly supporting the rising adoption of social technologies, employee-owned mobile devices, and cloud services. In fact, Forrester's research shows that a majority of challenges for security professionals all relate to business orientation and alignment. For example, many senior business and IT leaders are asking CISOs to better support and align with the business and IT objectives, requesting regular interactions and updates from security teams. Read More

FCC sets LTE as standard for public safety network
The FCC sets LTE as the standard for a nationwide mobile broadband network for public safety agencies. Read More

5 tips for Facebook from security and privacy experts
'Get the dislike button!' 'OMG this girl KILLED herself after her dad posted on her wall!' What do these comments have in common? They are two of the scams we see making the rounds on Facebook in an attempt to get you to click on and install a bad application. The Facebook con popping up everywhere this week is the 'total profile views' ruse. It's another version of the 'See who viewed your profile' trick that makes its way around the social network and plays to the user's ego and desire for information about who is checking out their Facebook page. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Top 10 Web hacking techniques of 2010 revealed
  2. Jack Bauer culture: Torture by 'patriots' for national security
  3. Two-thirds of U.S. Internet users lack fast broadband
  4. Cisco, Verizon enlist in 24-hour IPv6 trial
  5. Fedora 15 changes network device naming
  6. Forrester: Oracle confining Java future to enterprise use
  7. Gartner slams Cisco's single-vendor network vision
  8. Cisco: Puppy cams threaten Internet
  9. Red Hat builds gutsy, green virtualization machine
  10. New CIO cleans up outsourced IT at Clorox

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment