Monday, March 28, 2011

RSA risk mitigation

Network World Security: Identity Management - Newsletter - networkworld.com
Microsoft to FTC: Don't tell us how long to retain users' private data | Is Skype a security risk that endangers your privacy?

Network World Security: Identity Management

Forward this to a Friend >>>


RSA risk mitigation
Unless you've been in a coma the past week you're aware that some sort of security breach occurred at RSA and that "... information specifically related to RSA's SecurID two-factor authentication products" was "extracted from RSA's systems." Read More


WHITE PAPER: Oracle

The Total Economic Impact of Oracle Identity Analytics
This comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution. Use the model suggested in this report to design your implementation to quicken results and calculate cost savings. Read Now

WHITE PAPER: Quest Software

It's 9am. Do You Know What Your Directory is Doing?
In this new Quest Software white paper, you'll see how to get more information that native logging alone can't provide. See how you can get real time, centralized information, and how doing so maximizes Active Directory performance. Read More

Microsoft to FTC: Don't tell us how long to retain users' private data
Microsoft believes it's willingness to delete IP addresses tracked by Bing after six months (and cookies after a year and half) makes it an example of how to do privacy right. It is urging the Federal Trade Commission to consider the desires of Internet marketers before settling on new guidelines that cover data retention and other online privacy restrictions. Read More

Is Skype a security risk that endangers your privacy?
According to the NYTimes and Slashdot, there are reports of China stepping up electronic communications censorship beyond e-mail and the Internet in the form of "policing cellphone calls" such as if "antigovernment sentiment" words are spoken. Two callers, one speaking English and the other Chinese, have reported being cut off mid-sentence after saying "protest." Read More

FBI: How to be an expert at the black art of cryptography
Breaking written codes is seemingly a black art whose history dates back as long as people could write and wanted to keep secrets.  In the age of supercomputers and all manner of advanced technologies it's hard to imagine much cryptography expertise Read More


WEBCAST: Oracle

How Oracle Exalogic and Exadata Deliver Extreme Java
View this webcast to learn why Exalogic and Exadata are the definitive engineered platforms for enterprise application and database consolidation, with added advantage of extreme Java and database performance, unmatched reliability and scalability, and cloud-enabling elastic capacity. Register Today!

Google patches 6 serious Chrome bugs
The latest security update to Google Chrome includes two blacklisted SSL certificates that may be related to the recent theft of digital certificates from a Comodo reseller. Read More

UPDATE: Russian security team to upgrade SCADA exploit tool
A Russian security company plans to release an upgraded exploit pack for industrial control software that incorporates a raft of new vulnerabilities released by an Italian security researcher. Read More

NASA's "images" of life on Mars circa 1975
NASA has posted an interesting group of images its says were rendered by an unnamed artist from its Jet Propulsion Lab that show what the space agency, or at least the artist, though Mars might look like up close. Read More


WEBCAST: Dell - Intel

Get Mobile Right…Or Else!
This Webcast will probe the business-critical challenges swirling around the fast-evolving mobile infrastructure challenges most companies face. Register Now

ID thief sentenced to more than 16 years in prison
A Delaware man is sentenced to more than 16 years in prison on ID theft-related charges. Read More

Mozilla regrets keeping quiet on SSL certificate theft
Mozilla admits keeping silent about theft of digital certificates was a mistake on its part. Read More

Anonymous draws Congressional attention; battles disgruntled members
When Anonymous attacked HBGary Federal back in January, it set off a chain of events that has spawned widespread fascination, fear, anger and some paranoia among the security industry, government, law firms, Congress and even Anonymous itself. Read More

Big data to drive a surveillance society
Vendors and users of big data analytics gathered in New York this week to discuss the latest developments in a technology that they say will offer Web users and their customers a far more personalized experience while alleviating the need to throw away useful data. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Hot technology at the annual CTIA wireless show
CTIA Wireless offers a look at the evolving mobile landscape, from handsets and apps to core network systems. Here's a few of the things that are hot at the show in Orlando.

First look at Firefox 4
Firefox 4 has finally arrived, after months of delays and after rival Web browsers Internet Explorer 9 and Chrome 10 already shipped. The browser gets a speed boost and several feature enhancements that are so significant that they all have their own proper names, like Panorama, JaegerMonkey and Firefox Sync. Were they worth the wait? Let's take a look.

MOST-READ STORIES

  1. Microsoft pays Nortel $7.5 million for IPv4 addresses
  2. Wireless carriers delay Japan's text-to-give donations
  3. Microsoft now manages iPhone, Android, Windows, Linux
  4. Update Java and you may get annoying McAfee scanner too
  5. Nokia looks to make Windows Phone 7 hottest mobile OS
  6. Programmer fired for eating pizza
  7. Microsoft warns of hack attempt on Windows Live, Google
  8. Lots of "people" you interact with online are sockpuppets
  9. Is EMC/RSA poised to buy NetWitness?
  10. Can LTE really do it all?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment