Monday, May 30, 2011

The directory as graph

RSA tokens may be behind major network security problems at Lockheed Martin | Memory encryption breakthrough claimed by NC State researchers

Network World Security: Identity Management

Forward this to a Friend >>>


The directory as graph
Last issue I left you with the tagline, "But what will that future directory look like?" Read More


WHITE PAPER: Oracle

Enabling Single Sign-On from Desktop to Cloud
Organizations today are increasingly leveraging SaaS based applications to run various aspects of their businesses. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access. Read now

WHITE PAPER: BMC

Understanding Salesforce.com's Internet Application
BMC software and salesforce.com have joined forces to deliver BMC ServiceDesk on Remedy Force, an ITIL help desk, self service, and inventory management solution on the Force platform. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure. Read More Today!

RSA tokens may be behind major network security problems at Lockheed Martin
Lockheed Martin's has "major internal computer network problems," that one security blogger is linking to compromised RSA tokens, according to published reports. Read More

Memory encryption breakthrough claimed by NC State researchers
Researchers at North Carolina State University claim they've achieved a breakthrough in how encryption can be used in technology called non-volatile main memory, which is seen as an eventual replacement for conventional dynamic random-access memory. Read More


WEBCAST: F5 Networks

Ensuring High Availability for Client Access
F5's integrated application delivery solutions for Microsoft Exchange Server 2010 provide the required hardware load balancing for CAS servers. Learn More!

Key lessons learned from Sony hack-fest
The relentless cyberattacks against Sony should have businesses planning now what they will do when they, too, run afoul of ideologically motivated adversaries, experts say. Read More

Pressure SCADA developers on security
The discovery of a number of what have been described as serious vulnerabilities within industrial control systems built by manufacturing giant Siemens AG -- and the subsequent nixing of a presentation about those very vulnerabilities -- has raised questions about how the nature of vulnerability disclosure should -- or shouldn't -- change when it comes to the security flaws in industrial systems. Read More


WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

Oklahoma City using SIEM to crack down on hackers - and wayward employees
Oklahoma City is using technology that not only watches for signs of any hacker activity on its municipal government network, but monitors employee online behavior to assure no one's going out of bounds. Read More

Everything you need to know about Mac scareware
You'd think it was the end of the world. Read More

Unabomber Ted Kaczynski's personal possessions set for creepy online auction
Ok this is kind of creepy.  The US Marshalls Office today said it will hold an online auction of the personal effects of the Unabomber, Ted Kaczynski. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows 1.0: Still playing Reversi after all these years
  2. IE flaw could allow hackers access to accounts
  3. Apple sues teenager who sold white iPhone 4 conversion kits
  4. RSA tokens may be behind network security problems at Lockheed Martin
  5. Skype voice service crashes; users offered fix instructions
  6. Google Wallet: Five things you need to know
  7. Cisco is a top 3 server vendor
  8. Microsoft not to blame for Skype rejecting open source company
  9. Two convicted in U.S. over counterfeit Cisco gear
  10. Insider data theft costs Bank of America $10 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment