Search This Blog

Tuesday, September 06, 2011

Canada is out front with identity management

Security rundown for the week ending Sept. 2 | Air Force awards $25K to inventor of insanely fast device that stops fleeing cars

Network World Security: Identity Management

Forward this to a Friend >>>


Canada is out front with identity management
In light of the U.S. government's NSTIC (National Strategy for Trusted Identities in Cyberspace), which may or may not become a victim of the U.S. Congress' budget-cutting axes this fall, I'd thought we go take a look at another government initiative that might provide a blueprint for how NSTIC could proceed. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

WHITE PAPER: Entrust, Inc.

A Practical Approach to Authentication
Enterprise authentication used to be simple: passwords for everyone, expensive tokens for a small number who work remotely. But the workforce is now mobile and confidential data is at risk. CIOs are now challenged to increase authentication security while preserving operational and budget efficiency. Read Today!

Security rundown for the week ending Sept. 2
A mish-mash of security issues came up this week, everything from how to protect virtualized environments to a system that protects copper in utility sites from robbery and a story about digital certificate thefts. Read More

Air Force awards $25K to inventor of insanely fast device that stops fleeing cars
If you remember the "Dirty Harry" movie "Dead Pool" where a radio controlled corvette model car containing a bomb chases Harry around the streets of San Francisco and eventually detonates under his car destroying it, then you have the general idea of the technology a retired 66-year-old mechanical engineer came up with to win a $25,000 prize from the Air Force Research Laboratory. Read More

US Dept. of Energy devises security system to thwart rampant copper thefts
The US Department of Energy and its Oak Ridge National Laboratory has built a security system that is aimed at thwarting at least some of the copper thefts that plague utilities and other large facilities. Read More


WHITE PAPER: GFI Software

PCI-DSS Compliance and GFI Software Products
The intent of this document is to provide you with GFI's understanding of the requirements, and how the GFI Software product line can assist you to meet PCI compliance as outlined in the PCI DSS Requirements. Read now!

Man gets six years for hacking girls to extort photographs
A 32-year-old paraplegic was sentenced to six years in prison for infecting more than 100 computers in a quest for financial information, nude photographs and thrills. Read More

4 simple steps to bulletproof laptop security
Follow these tips, tools, and techniques to protect your Windows notebook against theft, intrusion, and data loss Read More

Apache patches Web server DoS vulnerability
The Apache open-source project patched its Web server software Tuesday to quash a bug that a denial-of-service tool has been exploiting. Read More


WHITE PAPER: Akamai Technologies, Inc.

Leveraging Cloud Security to Weather Threatening Storms
This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern day IT threats. It takes a close look at DDoS defense in particular. Read now

VMware strives to expand security partner ecosystem
VMware yesterday said it has added more security vendor partners to its vShield product-development program in which security firms work with the company to develop data protection specifically designed for VMware's flagship virtualization platform, which today is vSphere 5.0. Read More

Hackers may have stolen over 200 SSL certificates
Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project, a security researcher reported today. Read More

What CIOs Should Do About Rogue IT
The CEO has fallen head over heels for his iPad. The marketing team has set up shop on every social media site known to man. The sales group has secretly purchased its own software-as-a-service subscriptions. Meanwhile, the VP of operations is wondering whether there isn't something better out in the cloud that the company could use to run its supply chain. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. DoE devices security system to thwart rampant copper thefts
  2. Age bias in IT: The reality behind the rumors
  3. Microsoft's 5 biggest weaknesses
  4. Microsoft's IE will drop under 50% share by mid-2012
  5. Mapping the price of pot across the Internet
  6. Lenovo heats up price war with $199 IdeaPad tablet
  7. 10 energy projects that could electrify the world
  8. The Ruby Principle tells us Apple didn't fake latest 'lost iPhone'
  9. Microsoft claims its private cloud is up to four times cheaper than VMware's
  10. Desktop virtualization users say the technology brings challenges

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: