Monday, May 16, 2011

Integrated identity management: How to get it?

US senators: Corporate data breach reporting is inconsistent and unreliable | Top 5 things to do before buying more security technology

Network World Security: Identity Management

Forward this to a Friend >>>


Integrated identity management: How to get it?
We tried an experiment at the recent Kuppinger-Cole European Identity Conference called a "World Cafe." This is an "un-conference" style session with open-ended discussion among the participants centered around a specific area. Read More


WHITE PAPER: Oracle

Enabling Single Sign-On from Desktop to Cloud
Organizations today are increasingly leveraging SaaS based applications to run various aspects of their businesses. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access. Read now

WHITE PAPER: Qwest

Maximizing The Cloud To Your Needs
Today's enterprise is increasingly IT-dependent and network-based, requiring agile IT infrastructure sourcing approaches to meet rapidly changing business objectives. See how a dynamic, cloud-based infrastructure can flexibly supports key business needs—and whether it's right for your organization. Read now!

US senators: Corporate data breach reporting is inconsistent and unreliable
Cybersecurity breaches need to be made public in a more proactive and efficient way.  That was the crux of a letter Senator John Rockefeller IV (D-W.Va.) and four other senators today sent to the US Securities and Exchange Commission (SEC) asking the agency to bolster its corporate breach notification requirements. Read More

Top 5 things to do before buying more security technology
Las Vegas --Throwing more technology at security threats as they crop up is not the best way to go if the goal is to protect the most valuable data at the best price, attendees at Interop were told this week. Read More


WHITE PAPER: BMC Software

Answers to Tough Questions about SaaS
When it comes to Software as a Service, opportunities abound for improved and simplified IT Service Management. With solutions like BMC Remedy OnDemand, organizations can cut costs, advance ITSM and simplify upgrades. If you're considering the move to SaaS, read this list of common questions. Learn More Today!

Rambus buying Cryptography Research for $342.5 million
Rambus on Thursday said it has agreed to acquire security technology company Cryptography Research (CRI) for US$342.5 million in a cash and stock deal. The move could help the company address interest among chip makers to add security features on hardware. Read More

Interop: Cyberwar test runs yield information about defenses
Cyber warfare strategy is getting so sophisticated that network attacks suitable for major assaults are being used instead as trial runs meant solely to probe enemies with the aim of figuring out what their defenses are, an audience at an Interop security talk was told. Read More


WHITE PAPER: HP

Technology Fueling the Next Phase of Storage Optimization
ESG examines trends influencing the adoption of deduplication and the limitations of existing solutions and details how HP is best positioned to deliver highly efficient deduplication solutions based on its new HP StoreOnce deplication technology Read now

Little new in Obama cybersecurity proposal
A set of cybersecurity proposals, submitted to Congress on Thursday by the Obama Administration, contained little that was new or unexpected. Read More

Facebook, Twitter need corporate security policies
Social networks such as Facebook and Twitter open threats to sensitive corporate data that businesses need to deal with aggressively, Interop attendees were told. Read More

Enterprise note to Microsoft: Please make Skype easier to manage!
Skype voice and video has tended to trigger IT security angst, and now that Microsoft has bought Skype, some observers are voicing hope that the service will be improved to help it be better managed in an enterprise setting. Read More

What kind of cloud computing environment do you get for $6M?
The US Air Force said today it would spend $6 million to set up a state-of-the-art cloud computing research center at the University of Illinois.  The Air Force's Assured Cloud Computing (ACC) Center, will focus on developing technology to ensure mission critical data can get through the cloud securely and sometimes in the face of a cyberattack or other interference. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

So you think you know networking?
Network World has been around now for 25 years, and in that time the technology it covers has changed dramatically. It's been quite a ride. Here's a brief quiz to test your knowledge of some of what's been happening over that time.

MOST-READ STORIES

  1. IT pro's perfect game puts him in Putt-Putt record book
  2. Google launches Chrome OS, says Windows is 'torturing users'
  3. Anonymous struggles with rift, PSN blame
  4. 6 best Android Honeycomb tablets you can buy now
  5. First look at Chrome OS
  6. Now you can download your very own E.coli bacterium
  7. Chrome OS: 10 things you can (and can't) do with the Google PC
  8. Hot products at Interop
  9. Is WiMax dead or thriving?
  10. John Chambers on the network

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

  1. Anonymous12:43 PM

    Great post. I was checking constantly this blog and I am impressed!
    Extremely helpful info specifically the last part :) I care for such information much.

    I was looking for this certain information for a very long time.

    Thank you and good luck.

    Here is my website; Isotron accelerometer

    ReplyDelete