Monday, June 20, 2011

RSA: Lessons learned

U.S. military sharing secret cyber threat info with defense contractors | Connecticut concerned about Facebook face recognition

Network World Security: Identity Management

Forward this to a Friend >>>


RSA: Lessons learned
Not surprisingly, there's been a lot of discussion about the RSA SecurID debacle among my colleagues at Kuppinger-Cole. Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

WHITE PAPER: AirMagnet, Aruba Networks, Cisco, Enterasys Networks, HP, and Motorola

The 2011 Wi-Fi "Cheat Sheet"
Achieving Ethernet parity with Wi-Fi is no small task. Learn how leading vendors are building tool and tweaking architectures to: • Add capacity to APs • Avoid traffic bottlenecks • Identify and eradicate interference and its sources • Enable converged management and policy setting across Wi-Fi and wired environments Read now!

U.S. military sharing secret cyber threat info with defense contractors
A new U.S. military program shares classified information about cyber threats with defense contractors and their ISPs as part of a stepped up effort to blunt potential cyber attacks, a Department of Defense official announced on Thursday. Read More

Connecticut concerned about Facebook face recognition
Connecticut Attorney General George Jepsen has expressed concern that Facebook's "Tag Suggestions" face recognition feature compromises consumer privacy, and asked for a meeting with company officials. Read More

Microsoft rings alarm bell on fake Windows support calls
Microsoft today warned that scammers have taken to the phone lines to dupe Windows users into putting malware on their machines or paying for worthless help. Read More

As fraud abounds, design students craft safer ATMs
Going to an ATM can be an unnerving, vulnerable experience: You're faced against a wall, taking out cash with little visibility as to whom is watching you. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

Chinese court sentences three to prison for iPad design leak
A Chinese court sentenced three persons to prison for stealing information on Apple's iPad 2 design, which was used to make protective cases for the device months before the hit tablet was even launched. Read More

FTC warns of cell phone radiation scams
As soon as the new concerns that cell phones might pose a radiation risk to users, scammers were sharpening their online skills to take advantage of the situation.  That's why the Federal Trade Commission today told cell phone users to avoid products that supposedly "shield" users from cell phone emissions. More on health news: High-tech healthcare technology gone wild Read More

Fraud starts after Lulzsec group releases e-mail, passwords
Debbie Crowell never ordered the iPhone, but thanks to a hacking group known as Lulzsec, she spent a good part of her Thursday morning trying to get US$712.00 in charges reversed after someone broke into her Amazon account and ordered it. Read More

Cisco backs embattled RSA SecurID in new security architecture
With all of the recent security problems around RSA's SecurID two-factor authentication technology as a backdrop, Cisco today made it clear that it's still a major supporter of SecurID by including the two-factor authentication token as a main security component in what Cisco calls its "PCI 2.0 Architecture" of assembled Cisco, EMC, RSA, VMware and HyTrust products. Read More


WHITE PAPER: ADTRAN

Adopting Unified Communications: Key Steps to Consider
The faster your business can locate, gather and share information, the more productive and competitive you can be. That's why small and medium enterprises are upgrading to a unified communications (UC) system, which can improve customer service, streamline product development and speed response to new opportunities. Learn more. >>

Hospital turns to palm reading to ID patients
NYU's Langone Medical Center is the first hospital in the Northeast to use a new infrared palm-scanning technology that ensures patients are linked to their medical records and helps prevent medical ID theft. Read More

Smart grid (in)securities
As the power grid becomes more intelligent, it also becomes more dangerous. Read More

ADP acknowledges system intrusion, says one client hit
Automatic Data Processing (ADP) today disclosed that it has suffered a system intrusion that it believes has impacted only one client associated with Workscape, the benefits administration platform company it acquired. Read More

Don't dismiss community college grads with degrees in information assurance
The CAE2Y program was established to meet the needs of cybersecurity professionals – not all of whom have baccalaureates and advanced degrees. Zdravkovich emphasized that our society needs all dimensions of diversity in the cybersecurity field. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Want to stop cybercrime? Follow the money
  2. Chrome nearly replaced Firefox in Ubuntu Linux
  3. Cisco again looks to debunk the multivendor network
  4. iPhone 5 rumor rollup for the week ending June 17
  5. U.S. military sharing secret cyber threat info
  6. Cisco backs embattled RSA SecurID
  7. World IPv6 Day is complete. Did anyone notice?
  8. The data center needs an operating system?
  9. Microsoft rings alarm bell on fake Windows support calls
  10. 17 super-specific social networks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment