Search This Blog

Wednesday, July 20, 2011

Getting the band together again

Shift to virtualized environments shaking up security practices | Inside Apple iOS 5

Network World Security: Identity Management

Forward this to a Friend >>>


Getting the band together again
Thor Technologies was an early pioneer in the provisioning field before being gobbled up by Oracle as one of their first moves into the IdM space. Read More


WHITE PAPER: Riverbed

Streamline Business Continuity/Disaster Recovery Solutions
To succeed and thrive, today's organizations must create network environments that enable them to continue operations or recover in the shortest possible time. This paper provides practical advice for maintaining a functional DR strategy, and for streamlining business continuity solutions. Read More

RESOURCE COMPLIMENTS OF: CIO 100

Beyond the Big Idea: Executing on Innovation
Drawing on 10 years of research and diverse examples from companies such as Timberland and Harley-Davidson, Chris Trimble, Author and Professor, Dartmouth College will show you how to choose and build a great team through the innovation execution process, ultimately bringing your big ideas to their full potential. Join us at CIO 100, Aug 14-16, 2011. Register today!

Shift to virtualized environments shaking up security practices
The move to almost fully virtualized computing environments is driving a fresh approach to security in the enterprise, according to information technology security managers applying controls for VMware and Microsoft Hyper-V. Read More

Inside Apple iOS 5
A whirlwind tour of Apple's newest mobile software for the iPhone, iPad and touch Read More

Microsoft posts $250K reward for Rustock botnet herders
Microsoft upped the ante on Monday in its months-long battle against the Rustock botnet by posting a $250,000 reward for information that leads to the arrest and conviction of the hackers who controlled the malware. Read More


WHITE PAPER: CA Technologies

The Value of Service-Centric Visibility
IT organizations are under pressure to avert problems before they occur. To achieve the proactive approach required and move to the next level of service delivery, they need "service-centric" visibility that ties infrastructure components to the services that rely on them. Read More

Can you comply with court orders for data from the cloud?
The very nature of cloud storage, and one of its selling points, is that the cloud is dynamic. You only use what you need and shut down what you don't. Read More

7 high-tech programs that want to pick your brain
With increasing frequency it seems agencies of the government are looking to tap into the public conscienceness to gather information on everything from how you surf the Web to how they can use information generated by you to predict the future. It's all a little creepy, really. Here we take a look at seven programs announced this year that in some cases really want to crawl into your brain to see what's happening in the world. Read More

Anonymous takes aim at Google+ in more ways than one
Google+ may be getting some attention it doesn't want -- from Anonymous, which says it will target the new social networking site that launched last month. Read More


WHITE PAPER: Riverbed

Fine-Tune Your IT Performance
Learn how to bridge the gap between application performance management solutions that don't understand the underlying network and network management products that don't know how to map network traffic to applications. Learn more!

Apple iOS 4.3.4 security fix jailbroken overnight
Apple's iOS 4.3.4 PDF vulnerability fix issued Friday didn't stymie jailbreakers for long -- a beta jailbreak tool for the mobile software update was released on Saturday. Read More

Security Manager's Journal: The perils of enterprise search
I'm a big fan of search. The ability to use the Internet to cull information on virtually any topic with just a few clicks has made me more efficient and better informed. And "information" can come in the form of pictures, documents, videos, news feeds -- whatever you need. Read More

LulzSec resurrected to attack Murdoch
The hacker group LulzSec came out of retirement Monday to hack Rupert Murdoch's The Sun website and threatened to reveal emails from Murdoch's News International. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. Cisco to cut 6,500 jobs in cost-cutting blitz
  3. How dare Mercedes, Google exec use Apple's 'magical'?
  4. Anonymous takes aim at Google+ in more ways than one
  5. Getting at the real truth about IPv6
  6. Microsoft struggles to get Hyper-V drivers in Linux kernel
  7. 7 high-tech programs that want to pick your brain
  8. 10 hard truths IT must learn to accept
  9. Apple iOS still rules but Windows Phone 7 edges Android
  10. Apple could be next to ride on Android patent gravy train

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: