Wednesday, February 02, 2011

Costs of delayed validation

What is an 'Advanced Persistent Threat,' anyway? | FBI set to turn up advanced security search engine

Network World Security: Identity Management

Forward this to a Friend >>>


Costs of delayed validation
In my opinion, we should be equally vigilant in all of our business communications. Take the time to be sure that you got it right during a discussion with your colleagues. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

RESOURCE COMPLIMENTS OF: St. Bernard, now doing business as EdgeWave

Spend Less on Email Security, Earn $15 GC
Next-gen Email Security finds emerging email threats first, with our proprietary Zero Minute Defense TM- no one else has it. Protect your business-critical email and your network. We'll try to match the cost of your current solution, or any competitive offer you have. You'll earn cash just for checking us out. Click here for the EdgeWave Bid Desk.

What is an 'Advanced Persistent Threat,' anyway?
"Beware the Advanced Persistent Threat"! is the security vendor mantra of the moment. But really, what is an APT? Depends who you ask ... Read More

FBI set to turn up advanced security search engine
FBI system supports 200 million searchable records with an eye towards growing to 2 billion The FBI says it is set to roll out is N-DEx search engine and information sharing program to a wider swath of the federal, state and local law enforcement community. Read More

Watchdog Group questions Google's relationship with NSA
Consumer Watchdog group issues report that implies Google is protected by "inappropriate secret relationship" with NSA.Google is in hot water again -- or it will be if Consumer Watchdog can persuade the public to ask Congress to take action over the Google "Wi-Spy scandal." Additionally, Consumer Watchdog published a report, Lost in the Cloud: Google and the US Government [PDF], that highlights Google's relationship with NSA and claims the search giant has also "inappropriately benefited" from close and secretive relationships... Read More

BMW car key prototype unlocks hotel rooms, train seats
Researchers at BMW have developed a prototype car key that will unlock much more than just car doors. They've taken the wireless key already used to many cars and added an NFC, or near-field communication, function. Read More


WEBCAST: Cisco & Citrix

Regain Control of the Desktop
Learn how one IT organization is realizing the benefits of Desktop Virtualization and find out what they did to ensure a successful deployment of VMware View 4.5. Learn More

Multi-factor authentication for the rest of us
We often bemoan the seeming immortality of username/password authentication schemes. Why can't everyone implement strong authentication, multi-factor authentication, Secure Sockets Layer Virtual Private Networks (SSL VPN) for remote access? Read More

How Secure is That Cloud Vendor? Part Two
Last week, we explored the 7 basics of cloud computing vendor security, including identity, authentication, encryption, ILP/DLP and audit trails. Now here comes the deep dive: access control. Read More

Competition aims to make cybergeeks cool
A new high school competition aims to identify students interested in cybersecurity. Read More

5 New Online Security Threats to Avoid
Hackers just keep devising new ways to target Facebook and Amazon.com users. Read up on these five threats before you're "spear phished" - or worse. Read More


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

Cost of regulatory security compliance? On average, $3.5M
The cost of achieving regulatory security compliance is on average $3.5 million each year, according to a survey of 160 individuals leading the IT, privacy and audit efforts at 46 multinational organizations. Read More

Sophos aims to reduce mobile security risks
Sophos today said it would soon roll out its Mobile Control package that will let enterprise customers apply security controls to all things mobile, from iPads and iPhones to the Android, Windows Mobile and Symbian devices. Read More

How to manage consumer devices on your network
Your user community is connecting to your corporate email system using all kinds of consumer devices, from iPhones to iPads and Android-based smart phones. Do you know what devices are coming into the network? Do you know what applications are on these devices? Do you have any means to control them, preferably based on your standard policies? Fiberlink Communications has new Mobile Device Management services that can help. Read More

Security firm 'detonates' copies of suspicious files to sniff out malware, botnet attacks
HBGary Monday introduced an appliance that sits at the perimeter of the enterprise network to watch for possible incoming malware and outgoing traces of botnet infections. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. No more IPv4 addresses
  2. Android topples Symbian as world's No.1 mobile OS
  3. Internet 'kill switch' bill reintroduced as Egypt remains dark
  4. How to protect Windows from the new MHTML zero-day hole
  5. As IPv4 disappears, transition poses hazards
  6. Microsoft warns of new Windows zero-day bug
  7. Anatomy of an Internet blackout
  8. Kaspersky vows anti-virus products are safe despite source-code theft
  9. IPv4 addresses: Going, going, g...
  10. What is an 'Advanced Persistent Threat,' anyway?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment