Monday, February 07, 2011

Peeking over the IAM horizon

Yikes, Microsoft to patch 22 bugs next week | U.S. sacks counterfeiters in massive sting

Network World Security: Identity Management

Forward this to a Friend >>>


Peeking over the IAM horizon
Ireland's Research and Markets issued a report last month ("Business and Technology Issues in IAM") with this premise: The extended enterprise needs a comprehensive identity layer. Read More


RESOURCE COMPLIMENTS OF: St. Bernard, now doing business as EdgeWave

More Power, Lower Price, Earn $15 GC
iPrism Web Security's 500h appliance delivers 1Gbps of throughput for unrivalled speed and performance across your enterprise. We've got the power to handle your biggest pipeline. We'll try to match the cost of your current solution, or any competitive offer you have. You'll earn cash just for checking us out. Click here for the EdgeWave Bid Desk.

In this Issue


RESOURCE COMPLIMENTS OF: Hitachi CPC Jan-Feb2011

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. www.hitachimonitoringcenter.com Download free 30-day trial

Yikes, Microsoft to patch 22 bugs next week
Three zero days will be fixed and security experts warn that the massive re-boot could cause some services to freak out.There's some good news and bad news about next Tuesday's scheduled monthly patch day. The bad news is that it will be monster big, with restarts required. Microsoft will issue 12 updates that fix 22 holes, including holes in Internet Explorer (IE), Windows, its Internet server and Visio. So what, pray tell, is the good news? Read More

U.S. sacks counterfeiters in massive sting
With the National Football League's Super Bowl extravaganza as a background, the government announced what it called a record breaking $3.6 million sting aimed at counterfeit game-related sportswear sellers. The U.S. Immigration and Customs Enforcement (ICE) worked with multiple NFL teams and various law enforcement agencies throughout the nation to identify stores and vendors selling counterfeit trademarked items, ICE stated. Read More

It's Time To Re-Examine Endpoint Security
Commodity viewpoint is erroneous -- and dangerousBack in 2007, ESG Research asked 206 IT security professionals to respond to the following statement: "Desktop security has become a commodity market with little difference between products." As expected, 58% of respondents either strongly agreed (17%) or agreed (41%) with this statement. In other words, it really didn't matter whether your ran Internet security tools from Kaspersky, McAfee, Microsoft,... Read More

Pwn2Own organizer predicts Chrome will survive first day
Google's Chrome will likely survive the first day at next month's Pwn2Own hacking challenge, but may fall the next when the rules change, the contest organizer predicted. Read More

Can you guarantee secure remote access from devices in the wild?
In the course of scores of conversations about security, I have regularly elicited a gobsmacked silence with a simple question: "How do you reliably secure access from an untrusted computer?" Read More


WHITE PAPER: Alcatel-Lucent

Convergence without Complexity
Gain insights from real-world convergence implementations to help you successfully plan and deploy an application converged network. Because the obvious technology solution may not be the right choice, this paper illustrates how you can avoid common pitfalls and make informed decisions. Read now

Reader X spoils new PDF attack
Adobe's Reader X, last year's upgrade that features a "sandbox" designed to protect users from PDF exploits, stymied a recent attack campaign, researchers said. Read More

What a girl wants: 25 techie gifts for your Valentine
There's still plenty of time to shop for your Valentine, and you don't even have to leave your desk to buy one of these 25 tech-inspired gifts. Read More

From cloud and mobile security to encryption, security concerns abound as RSA turns 20
Microsoft's Bill Gates being a turning point at which RSA became an all-encompassing security forum. "It was a big acknowledgment for Microsoft to send its top executive here," she says. The conference has drawn Cisco's CEO John Chambers, U.S. department of Homeland Security secretaries Michael Chertoff and Janet Napolitano Read More

What security technology will be hot at RSA 2011?
The annual RSA Conference, now in its 20th year, will be rocking next week as the security industry gathers in the weeklong extravaganza of product introductions and security experts arguing cloud and mobile computing security issues. Read More

Microsoft fixes cookie security bug in Windows Azure
Microsoft fixes a security bug in Windows Azure, and offers a new "extra small" cloud computing instance. Read More


WHITE PAPER: Qualys Inc.

The Top 10 Reports for Managing Vulnerabilities
This free guide covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organizations are using to reduce risks on their network infrastructure. Read now!

Google bets $20K that Chrome can't be hacked
Google will pay $20,000 to the first researcher who successfully exploits its Chrome browser at this year's Pwn2Own hacking contest. Read More

NIST report aims to help U.S. agencies deploy cloud apps
The ease with which cloud computing services can be deployed heightens the security and management risks, according to a National Institute of Standards and Technology report. Read More

Cisco announces three new security certifications
It's Cisco Live this week - in London, at least. As usual, Cisco announced new certifications, this time all of them in security. Read More

DARPA offers up $10,000 challenge for new military fighting vehicle
Can you design a tank? Well you could win $10,000Ok so it may not be a tank, but the scientists at the Defense Advanced Research Projects Agency (DARPA) today issued a $10,000 to design a next-generation military fighting vehicle. Read More

Super technologies that will change the face of football
As Super Bowl Sunday approaches, we take a look at science and technology that could redefine football as we know it. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. Want a new IT job? Now's your chance
  2. Watchdog group questions Google's relationship with NSA
  3. Cisco announces three new security certifications
  4. GoDaddy isn't as pretty as you thought
  5. Microsoft bolts HTML5 video onto Chrome for Windows 7 users
  6. Red Hat defends Microsoft in i4i patent dispute
  7. Android: We're number one!
  8. No more IPv4 addresses
  9. Super technologies that will change the face of football
  10. 15 more useful Cisco sites

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment