Search This Blog

Tuesday, February 22, 2011

CardSpace, we hardly knew ye

Microsoft downplays threat of new Windows zero-day | Feds wrongly links 84,000 seized sites to child porn

Network World Security: Identity Management

Forward this to a Friend >>>


CardSpace, we hardly knew ye
Back in the Vietnam War era a popular slogan was, "Suppose they gave a war and no one came?" Well, suppose they created an identity client and no one used it? Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

RESOURCE COMPLIMENTS OF: Hitachi Data Systems

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. Download free 30-day trial

Microsoft downplays threat of new Windows zero-day
Microsoft is downplaying the threat posed to Windows users by a recently-revealed vulnerability, saying it's unlikely the bug could be exploited to compromise a computer. Read More

Feds wrongly links 84,000 seized sites to child porn
Imagine you're a respectable, law-abiding owner of a small business. You show up to your shop one morning, only to find the doors barred and a big sign in front window reading, "The federal government has seized this business as it's affiliated with creating, distributing, and/or storing child pornography." Read More


RESOURCE COMPLIMENTS OF: Oracle

Oracle Security Online Forum
Join us, February 24th, for the Oracle Security Online Forum, where leading industry executives and Oracle product experts will come together to discuss security trends, best practices, and proven solutions for your business. Click here to learn more

7 ways to avoid getting hacked by Anonymous
The hactivist group Anonymous used a series of simple technical and social exploits to crack the network of security-technology firm HBGary Federal, giving the company a schooling that other network security pros can learn from. Read More

Ugliest tech stories of 2011 -- so far
Apple gets screwy, Anonymous gets really angry, Egypt pulls the plug, MySpace melts down and moreWe usually wait until the end of the year to compile lists such as Ugliest Tech Stories of the Year or Top Tech Stories of the Year, but why wait when 2011 has gotten off to such an ugly start? I'll update this piece regularly, assuming the ugliness continues... FEBRUARY Wrath of Anonymous Read More


WHITE PAPER: Quest Software

Collecting Compliance Evidence: The Role of Event Logs
This Quest Software white paper discusses how to maximize the power of event logs. You'll learn about recent regulation changes, how your company can best prepare for an audit and the solution you need to address these issues. Read More

Security departments not prepared for new technologies
Rapid adoption of mobile technology, social media and cloud computing in the workplace is creating a security problem for IT departments worldwide as they struggle to keep pace with demands, according to a survey released this week by security certification firm (ISC)2. Read More

US bill would prohibit Internet 'kill switch'
Three senators introduce new legislation prohibiting the president from shutting down the Internet. Read More

Do wireless providers like Verizon and AT&T crimp mobile security?
Do wireless service giants such as AT&T and Verizon wield their power to effectively stand in the way of mobile-device security? Read More

IT execs at RSA extol virtues of cloud computing, with familiar caveats
Deciding to move enterprise data into cloud-computing environments is still a decision fraught with anxiety over security, as well as operational and legal issues, say IT managers, but the prospect of cost savings and ability to "burst" data into the cloud during peak periods is proving irresistible. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. How IT pros cheat on certification exams
  2. X Prize $30 million private race to the moon is on
  3. 7 ways to avoid getting hacked by Anonymous
  4. Cisco grapples with transition as routers and switches lag
  5. Angry employees tattling on companies that violate software licenses
  6. 6 cool things learned from the National Broadband Map
  7. Jennings explains his Jeopardy loss to Watson
  8. Microsoft builds speedy flash bridge between RAM and hard disk
  9. Geekiest marriage proposals of all time
  10. Tech 'firsts' that made a President's day

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: