Monday, September 19, 2011

History lesson on cross-platform identity management

US Energy Dept. finds myriad challenges to building culture of network security | US CTO wants consumers to have instant online access to their energy usage

Network World Security: Identity Management

Forward this to a Friend >>>


History lesson on cross-platform identity management
Tom Kemp is the CEO of Centrify, a company which -- at its core -- is about tying other platforms (Unix, Linux Macintosh, etc.) into Active Directory to centralize administration, which Tom refers to as "Active Directory Bridging." He's been practicing this bridging since founding Centrify in 2004 and has been working with AD since founding his previous company, NetIQ. He knows what he's talking about in regard to Active Directory. Read More


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

WEBCAST: IBM

Using IBM Tivoli Security Management for z/OS
Administration can be a complex world where security is concerned. The resources spent on administration, management, auditing and compliance can be considerable. Watch the demo, "Using IBM Tivoli Security Management for z/OS," and see how IBM® can help you protect your business—simply, efficiently and more effectively. Learn More

US Energy Dept. finds myriad challenges to building culture of network security
When it comes to securing the nation's critical energy networks, the Department of Energy says much work remains. Key to that work are the engineers, network administrators, vendors and others behind the security technology -- but they will be leaving the industry in droves in the next five years, according to a Department of Energy security roadmap issued this week. Read More

US CTO wants consumers to have instant online access to their energy usage
The idea sounds simple enough: you can go to your utility's Web site, click a green button and you get information about your household energy use. Develop the technology that makes such a green button possible, is what US Chief Technology Officer Aneesh Chopra told attendees of this week's GridWeek conference and then posted on the White House Science and Technology blog. Read More

Security roundup: Stealing from the military; persistent threats; mammoth security problems; bot armies
Sometimes the difference between selfless valor and selfish cowardice is stark. On the same week that 21-year-old Marine Sgt. Dakota Meyer is awarded the Medal of Honor for heroism in saving his compatriots in Afghanistan, we hear that Rene Quimby, 42, is sentenced to prison for stealing 16,000 identities of U.S. military service members and using that information to steal from 650 victims. Read More


WHITE PAPER: F5

Hardware Load Balancing
A comprehensive F5 solution readies application infrastructure for a successful implementation of the re-engineered Microsoft Exchange Server 2010. Learn More!

FTC plans changes in online child privacy protection rules
The U.S. Federal Trade Commission has proposed amendments to online privacy rules for children that aim to give parents control over what personal information websites may collect from children under 13. Read More

Cybersecurity Solution for Anonymous: Hire Hackers vs. 20 Years Jail Time?
I've always thought hackers could save the world if they chose to, so a post on MSDN blogs my eye. I stopped on Terry Zink's Cyber Security Blog and watched the TED video, Hire the hackers! Read More

Oracle: Security flaw could bring down app servers
Oracle has issued an emergency patch to fix a vulnerability it says could bring down HTTP application servers it sells that are based on Apache 2.0 or 2.2. Read More


WHITE PAPER: BMC

Deliver Workload Automation Services to Business Users
Workload automation touches every aspect of the business. It is made up of all scheduled and ad hoc processes that support critical business functions. Read More!

Man stole data from U.S. service members via P2P
A California man who dug up sensitive information belonging to U.S. service members on peer-to-peer networks, and then used it to order iPods, cameras, and even washing machines from an online store, was sentenced to 75 months in federal prison Thursday. Read More

DHS seeks to share top-secret info with banking and finance cybersecurity pros
The Department of Homeland Security works with financial institutions to thwart cyber attacks and plans to do so more and more in the future, according to DHS testimony to Congress, including sharing top secret cyber intelligence. Read More

PCI point-to-point encryption guidelines raise new questions
The PCI Security Standards Council today is expected to issue guidelines on use of point-to-point encryption in protecting sensitive payment card data, but the narrow approach — which is focused on hardware — is raising questions. Read More

Bot army being assembled, awaiting orders
A mammoth army of infected computers is being assembled, but it's unclear yet what purpose they will be put to. Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. Buzzblog: Blue screen of death gets a new look in Windows 8
  2. Has Google's CEO stopped using Google+?
  3. Enterprise WAN connectivity: MPLS VPN vs. Public Internet
  4. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  5. Bot army being assembled, awaiting orders
  6. Facebook's new friend lists: 5 things you need to know
  7. Stevie Wonder thanks Steve Jobs for making the iPhone and iPad so accessible
  8. Survey ranks best IT departments in financial services
  9. Windows Server 8: The Microsoft server fork
  10. Server 8 benefits from lessons learned with Azure

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment