Search This Blog

Monday, May 23, 2011

Secure authentication to the cloud

You call that a virus? How I kicked the Mac Defender's butt in five seconds | Apple's silence raises big questions about patent protection on iOS and Mac OS X

Network World Security: Identity Management

Forward this to a Friend >>>


Secure authentication to the cloud
Directories and directory stores featured in a great workshop session I attended at the recent European Identity Conference (EIC), which was also a good place to catch up with an old friend, Michel Prompt -- CEO of Radiant Logic, one of the pioneers in virtual directories. I want to tell you about a new service from Radiant Logic. Read More


WHITE PAPER: Oracle

The Total Economic Impact of Oracle Identity Analytics
This comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution. Use the model suggested in this report to design your implementation to quicken results and calculate cost savings. Read now

WHITE PAPER: Dell

Is Your Infrastructure Mobile Ready?
From data encryption to secure printing, there are many challenges IT mangers at small and midsize businesses face to secure mobile devices. Check out the resources in this Mobility KnowledgeVault to help develop a master plan. Read now

You call that a virus? How I kicked the Mac Defender's butt in five seconds
About six months ago, I bought the MacBook Air, the first Apple computer I've owned since my childhood self played Oregon Trail on the Apple II in my family's house. I was told by some Mac lovers that I'd never need anti-virus software, but I installed the free Sophos software just in case.  Read More

Apple's silence raises big questions about patent protection on iOS and Mac OS X
The Electronic Frontier Foundation (EFF) is calling on Apple to indemnify its developers from Lodsys — a patent troll that's alleging patent infringement on the in-app purchasing used by iOS apps. You know, the technology developed by Apple and forced on many of its developers. Read More

Sony hit again with two hacks
Hackers have apparently hit Sony again, adding to the embarrassment caused by earlier massive attacks on its PlayStation Network. Read More


WHITE PAPER: Netezza, an IBM Company

Oracle Exadata and Netezza TwinFin™ Compared
This ebook will provide the fundamental differences between the Netezza TwinFin® and Oracle Exadata solutions from the perspectives of query performance, simplicity of operation and value. The ebook will help you determine which solutions best meet your business needs and how to achieve optimal results from your data. Read now

China's Great Firewall "father" pelted with egg, shoes
Somewhere George W. Bush might be laughing.  The BBC is reporting that China officials are looking for a man who allegedly threw an egg and shoes at the designer of the country's Great Firewall technology. Read More

Industry agrees on security vulnerability reporting format
Three years after its founding, the Industry Consortium for Advancement of Security on the Internet (ICASI) is starting to bear fruit with the launch of version 1.0 of its framework designed to allow tech vendors to more easily share data on software vulnerabilities. Read More

Chinese policies put foreign firms at disadvantage, U.S. report concludes
In order to boost local Chinese companies and thwart foreign-based firms, the Chinese government has shown strong favoritism toward Chinese-owned manufacturers in the telecommunications and software markets, according to a U.S. government agency report. Read More


WHITE PAPER: BMC Software

Answers to Tough Questions about SaaS
When it comes to Software as a Service, opportunities abound for improved and simplified IT Service Management. With solutions like BMC Remedy OnDemand, organizations can cut costs, advance ITSM and simplify upgrades. If you're considering the move to SaaS, read this list of common questions. Learn More Today!

Security researcher slams Microsoft over IE9 malware blocking stats
Microsoft's claims that Internet Explorer 9 (IE9) blocks attacks just don't add up, a security researcher charged Friday. Read More

Six rising threats from cybercriminals
Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector. Read More

Siemens industrial-control security vulnerability could be disclosed today
Although a public talk about new vulnerabilities found in Siemens industrial control systems (ICS) was pulled yesterday from a conference agenda due to its sensitive nature, the head of the vulnerability-test group that discovered the security holes said it expects Siemens will soon have a fix and will be discussing it. Read More

VMware seeks security 'manager of managers' role for vShield
With the popularity of its virtual-machine software soaring, VMware has been focusing on optimizing security for its vSphere platform both through cooperation with third-party security vendors and encouraging a shift to its own software-based security architecture known as vShield. Read More

US wants novel, smart apps to help patients make healthcare decisions
The US Department of Health and Human Services today said it would fund the development of a new generation of what it called novel, unconventional intelligent applications that could help people make complex health decisions. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

A quick guide to '4G' phones
We've created this handy guide to 4G smartphones – all of which are based on the Android operating system right now – to help you look past the marketing rhetoric and learn what to really expect from these phones.

MOST-READ STORIES

  1. When Steve Jobs isn't wearing jeans and a black turtleneck
  2. Six rising threats from cybercriminals
  3. Nonprofit treats Microsoft Outlook frustration with Google Apps
  4. Siemens SCADA hacking talk pulled over security concerns
  5. Cisco to dump Linksys, WebEx?
  6. IEEE seeks data on Ethernet bandwidth needs
  7. Microsoft: One in 14 downloads is malicious
  8. 15 best iPad apps for newbies
  9. Microsoft's cloud licensing changes: what you need to know
  10. The coming battle between Android and Windows Phone 7

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: