Wednesday, July 13, 2011

My readers can be my best sources

Anonymous hacks Booz Allen Hamilton, steals 90,000 military emails | Mac security firm ships first-ever iPhone malware scanner

Network World Security: Identity Management

Forward this to a Friend >>>


My readers can be my best sources
I love my readers. Yes, that's you I'm talking about. Time and time again you (individually or in groups) come up with just the information I need. Of course it is a two-edged sword -- sometimes you find data that seemingly contradicts what I've said. But most of the time you know the whereabouts of the documents that can help prove a point or answer a question. Read More


WHITE PAPER: Quest Software, Inc.

Control and Manage Super User Access
Managing privileged – aka "super user" – accounts is vital for addressing your company's security concerns. In this Quest white paper, see why native management tools are limited, and discover a comprehensive suite of tools that makes managing privileged accounts quick and easy. Read it today.

RESOURCE COMPLIMENTS OF: LogMeIn

Remote Support for PCs, Macs, Tablets and Smartphones
Provide instant, on-demand remote support with LogMeIn Rescue. Without pre-installed software, quickly connect to PCs, Macs and smartphones anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try Rescue free, today.

Anonymous hacks Booz Allen Hamilton, steals 90,000 military emails
The hacker group Anonymous claims it has stolen information from government contractor Booz Allen Hamilton that it says will help it hack into resources of other contractors and security consultants. Read More

Mac security firm ships first-ever iPhone malware scanner
French security firm Intego, which is known for its Mac OS X antivirus software, today released the first malware-scanning app for the iPhone and iPad. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Cyberwar and cyber-isolationism
There has been a bit of a splash in the press the last few days about a mention by former CIA Director Michael Hayden of the idea of creating new, extra secure internets for government or commerce. Read More

Microsoft patches 'sexy' Bluetooth bug in Vista, Windows 7
Microsoft today patched 22 vulnerabilities in Windows and Office, including a bug in the Bluetooth technology within Vista and Windows 7 that could be used to hijack a nearby PC. Read More


WHITE PAPER: IBM

The power of unifying communications and collaboration
This paper highlights key drivers, benefits and characteristics of effective unified communications and collaboration solutions. It also examines end-to-end IBM UC2 solutions and the advantages organizations can realize by teaming with IBM. Read now

Consumer device use grows, but IT and security can't keep up
IT and security managers are slowly embracing the growing number of consumer devices, such as iPhones and iPads, that are being used by workers within their organizations, but many enterprises are still overwhelmed by the need to mitigate risk and support the devices. That is the finding of new research released Tuesday by Unisys Corporation. The study was conducted for Unisys by International Data Corp. Read More

Will keyboards type out death knell for cursive writing?
Keyboard typing and messaging are the way of future no doubt but at the cost of cursive writing? That seems to be the trend as Indiana this week became one of a number of states that no longer require cursive to be taught, but rather require typing skills instead. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. Cisco layoffs expected soon
  2. Buy Windows 7 today, keep same PC for Windows 8 upgrade
  3. Ballmer, Branson headline Microsoft's partner conference
  4. 7 free Windows tune-up tools and tips
  5. Anonymous breaks into Booz Allen network
  6. Who are all these hacker groups?
  7. IBM takes dim view of EU claims
  8. Google+ Privacy: 5 settings you need to know
  9. Android fans flocking to iPad for tablet fix
  10. Microsoft plans big Skype/Lync integration

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment