Search This Blog

Wednesday, February 16, 2011

A Quest for secure authentication

Stolen US military IDs ideal cover for army of online dating scammers | Hot products from RSA 2011

Network World Security: Identity Management

Forward this to a Friend >>>


A Quest for secure authentication
Some companies like to partner with IdM vendors either on specific projects or for strategic solutions. Some companies like to acquire IdM vendors to either round out their product offering or to provide specific tools to solve a specific need for their customers. And some companies do both. Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

RESOURCE COMPLIMENTS OF: Oracle

Oracle Security Online Forum
Join us, February 24th, for the Oracle Security Online Forum, where leading industry executives and Oracle product experts will come together to discuss security trends, best practices, and proven solutions for your business. Click here to learn more

Stolen US military IDs ideal cover for army of online dating scammers
Fraudsters use stolen military IDs, online dating services to steal moneyIt's a new twist on an old scam. The Army Times newspaper today details the growing trend of fraudsters stealing the identities of US Army soldiers from social network sites and then using that information to set up false profiles on Internet dating sites. The profiles are uses to dupe prospective dates out of their money. But there are other consequences too. Read More

Hot products from RSA 2011
Security conference showcases the next trends in network security. Read More

Symantec looks to protect users from mutating malware
Symantec today announced the 12th edition of its flagship enterprise desktop anti-malware product, Symantec Endpoint Protection, that looks to go beyond traditional anti-virus signatures to use a cloud-based file-identification system to protect users from virus mutations. Read More

Obama seeks big boost in cybersecurity spending
The White House is proposing a big increase in cybersecurity research and development in next years budget to improve, in part, its ability to reduce the risk of insider threats and ensure the safety of control systems, such as those used at power plants. Read More


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

Tablets, smartphones force Cisco to rethink how security works
SAN FRANCISCO -- Cisco has unveiled a self-described "complicated" security architecture dubbed SecureX that it says provides a context-aware way to safeguard networks increasingly overrun with smartphones, tablets and virtualization. Read More

5 ways to make sure you aren't the next Wikileak
Here are five key tips to help your government agency or enterprise avoid being the source of the next Wikileak. Read More

Should you worry about rogue wireless network access points?
The subject of rogue access points (RAPs) has been on our minds lately, and in our ongoing 2011-2012 benchmark interviews we have been asking folks about their experiences with them. Read More

Virtualization can be key to cloud security, RSA chief says
In a keynote address at the RSA Security Conference here, RSA chief Art Coviello struck an optimistic tone about the future of security in cloud computing environments. Read More


WHITE PAPER: Quest Software

Collecting Compliance Evidence: The Role of Event Logs
This Quest Software white paper discusses how to maximize the power of event logs. You'll learn about recent regulation changes, how your company can best prepare for an audit and the solution you need to address these issues. Read More

Impact of Server Virtualization on Future IT Management Strategies
Few users—regardless of technology segment—believe that virtualization will have little or no impact on their infrastructure management processes and toolsESG research respondents across five IT disciplines exhibit a desire for more effective management tools. In order to explore this topic in more detail, respondents with knowledge of their organization's server, storage, and/or networking operations were also asked about the impact of server virtualization on their functional technology management processes and tools (see below graphic). Read... Read More

7 Precautions to Take Before Your Phone is Lost or Stolen
Few things hurt more than losing your mobile phone. Read More

SonicWall introduces SuperMassive next-gen firewalls with enough oomph for data centers
SonicWall is announcing at the RSA conference this week four next-generation firewalls designed with enough speed for deployment in data centers. Read More

Vulnerability management tools: Dos and don'ts
DON'T shortchange remediation. Surprisingly, organizations will perform vulnerability scans, or hire someone to conduct a scan, get a report and then not follow through. They may cherry-pick one or two critical items and neglect the rest. The result is that the organization has spent time and money without doing much for its security. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. Geekiest marriage proposals of all time
  2. Are the iPad 2 HD rumors for real?
  3. FCoE: From fee to free
  4. IBM's Watson surges to Jeopardy lead, retains tie against humans
  5. Microsoft certifications won't boost your pay much
  6. 'Laptop is dead,' proclaims MDM company
  7. Tablets, smartphones force Cisco to rethink how security works
  8. iPads storm the enterprise
  9. Five iPad safety tips
  10. J.C. Penney caught gaming Google

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: