Search This Blog

Monday, September 12, 2011

Setting the record straight on US, Canadian governments' trusted identity programs

Whoops! Microsoft leaks patch info four days early | Verizon fires workers who ran, participated in office football pool

Network World Security: Identity Management

Forward this to a Friend >>>


Setting the record straight on US, Canadian governments' trusted identity programs
One of last week's newsletters ("Canada is out front once again") caught the attention of folks at the U.S. National Institute for Standards and Technology (NIST), and not in a good way. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

WHITE PAPER: IBM

Coca-Cola Bottling Co. Consolidated Moves to DB2
This serves as a guide to improve the process of planning, design, development, and rollout/cutover of the upgrade. Read Now

Whoops! Microsoft leaks patch info four days early
Microsoft jumped the gun today by prematurely releasing information on all five of the security updates it plans to ship next Tuesday. Read More

Verizon fires workers who ran, participated in office football pool
If you thought taking part in the office Super Bowl pool or filling out a March madness bracket at work wasn't a big deal, think again - especially if you work at Verizon. The Taunton (Mass.) Gazette today reported that Verizon fired six workers and suspended 32 others for taking part in a Super Bowl pool this year. Read More

Warning: HIPAA has teeth and will bite over healthcare privacy blunders
Healthcare organizations that are performing risk assessments as a way to craft patient-privacy policies might want to consider a new potential attack vector: federal regulators. Read More


WHITE PAPER: Sybase

Bloor Report: Sybase® IQ 15.3 In Detail
Sybase® IQ is well positioned to compete with traditional and appliance vendors. While it has different advantages in dif¬ferent environments, it merits careful review by organisations investigating data warehousing, high-speed analytics and business intelligence options. Read now.

Stop Using FTP! How to Transfer Files Securely
File Transfer Protocol (FTP), one of the oldest of Internet protocols, is still widely deployed, but it's the protocol sysadmins love to hate. Back in FTP's early days, the Internet was just a small network of computers where everyone knew everyone else, and FTP made little provision for security. Later revisions of the specification tried to add security features, but you can't fix an amputation... Read More

9/11: Top lessons learned for disaster recovery
In the decade since the Sept. 11, 2001 terrorist attacks, physical security, human contingency planning and an evolution in technological capabilities have improved the odds that business can carry on during -- and after -- a disaster. Read More

Hacker claims he can exploit Windows Update
The hacker who calls himself "Comodohacker" said this week that he could have used digital certificates stolen from a Dutch firm to issue fake updates to Windows PCs. Read More


WHITE PAPER: Oracle

CBS eBook: The Next Generation of Mission-Critical Computing
Download this eBook to discover why Oracle's SPARC T3 servers represent the next wave of innovation for mission-critical computing and are a logical next step for dealing with today's most critical data center challenges. Learn More!

Credit card forger sentenced to 14 years
A man who sold phony credit cards online was sentenced to 14 years in prison and must pay more than $3 million after pleading guilty to wire fraud and identity theft. Read More

Security roundup: How did 9/11 change IT?; Microsoft premature patching; HIPAA gets nasty
The 10th anniversary of the infamous Sept. 11, 2001, terrorist attacks on America is prompting reflection on those who died on that day of mass murder, and what changed in our society because of it. Read More

Cernam raises the bar for capturing and preserving online content as evidence
When it comes to using online content as evidence in a lawsuit, it's not sufficient to have a screen capture or other image of the content. Cernam is introducing new "capture and preserve" technology that precisely captures online content and its metadata and other properties so the content is valid as evidence. Read More

Apple strikes stolen SSL certificates from OS X
Apple today released an update to Mac OS X that blocks Safari users from reaching sites secured with certificates stolen from a Dutch company last summer. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. ACLU: You have every right to photograph that cop
  2. Carnegie Mellon opens competitions aimed at building slick robots
  3. 9/11 anniversary: What our emergency response systems still can't do
  4. Microsoft inks licensing deals with two more Android makers
  5. OpenFlow inventor: Network provisioning will inevitably be automated
  6. Why I'm ignoring my W7 warning messages
  7. Hacker claims he can exploit Windows Update
  8. ATM hack gives cash on demand
  9. Behind the scenes of Wellesley College's desktop virtualization rollout
  10. 9/11 continues to influence IT strategy

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: