Search This Blog

Monday, September 26, 2011

Thank you, one and all

Security roundup: Privacy ground war; malware taunts; Massachusetts data loss stink; is SIEM dead? | Database Security Needs Improvement

Network World Security: Identity Management

Forward this to a Friend >>>


Thank you, one and all
It was just over 12 years ago I wrote: "Welcome to the first Directory Services newsletter from Network World," and today we've reached the penultimate issue. Time flies when you're having fun. And it has been fun, for the most part, as the Directory Services newsletter matured into the Identity Management newsletter ultimately becoming part of the Security arena. Read More


WHITE PAPER: CA Technologies

Service Assurance Defined
This Forrester paper explains the concept of service assurance and highlights how it can address fundamental issues around managing application performance and business services. Learn More

WHITE PAPER: F5

ROI of Application Delivery Controllers
How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI. Learn More!

Security roundup: Privacy ground war; malware taunts; Massachusetts data loss stink; is SIEM dead?
Personal privacy or the growing lack thereof was one of the hot security buttons this week. Read More

Database Security Needs Improvement
Databases store much of the world's most sensitive data so you'd think they'd be well protected with the right layered security defenses, access controls, and logging. Unfortunately, if you made this assumption you'd be incorrect -- databases face a much higher level of risk than most people (and business executives) are aware of. According to ESG Research, 95% of enterprise organizations consider... Read More

'Lurid' malware hits Russia, CIS countries
The latest espionage-related hacking campaign detailed by security vendor Trend Micro is most notable for the country it does not implicate: China. Read More

Microsoft passes Rustock botnet baton to FBI
Microsoft on Thursday wrapped up its civil case against the still-unnamed controllers of the Rustock botnet and handed off the information gleaned during its investigation to the FBI. Read More


WHITE PAPER: CA Technologies

Performance Metrics and the Cloud
Unlike static configuration management databases, which often contain information too outdated for real-time understanding, a dynamic operational service model provides relevant, timely information. Read More

New Mac malware poses as PDF doc
Security firms today warned Mac users of a new Trojan horse that masquerades as a PDF document. Read More

EFF inspects encryption tool for Adium, Pidgin IM clients
The digital watchdog Electronic Frontier Foundation (EFF) lent a technical hand to fix security problems in a tool used to encrypt instant messenger conversations using the Adium and Pidgin programs. Read More

Bad new world: Cyber risk and the future of our nation
In September 2007, in a remote laboratory in Idaho, researchers began to show that that picture had begun to change, dramatically and irreversibly. Dubbed "Aurora," the researchers' project demonstrated the ability of a cyber hacker to destroy physical equipment--in this case a generator used to create electricity for the power grid. The Aurora research brought the question of physical safety and the ability for a nation to defend itself from attack in the cyber world to the forefront. For the next three years, this difficult discussion would largely remain just a discussion, contemplated, if passionately, in corners of Washington and at wonk-ish meetings across the U.S. Read More

Alleged LulzSec Sony hacker arrested
The U.S. Federal Bureau of Investigation has arrested a Phoenix student, claiming that he is one of the LulzSec hackers responsible for a database attack on Sony Pictures computers that claimed more than 1 million victims. Read More


WEBCAST: CA Technologies

Managing Service Quality Across the Infrastructure
With zero tolerance for latency of web applications and a near total dependence on technology in the workplace as the norm, an unpredictable and unreliable infrastructure is too big a risk for today's speed of business. View Now

Netflix deals with cloud security concerns
As Netflix commits its future to streaming movies to customers, it relies almost exclusively on cloud services for its infrastructure, raising security concerns that require a new way of thinking, the company's cloud security architect says. Read More

Facial recognition security, privacy issues grab FTC attention
The Federal Trade Commission the week said it will hold a workshop that examines how burgeoning use of facial recognition technology impacts privacy and security. Read More

Data-breach insurance caters to small businesses
With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data. Read More

Social engineering attacks costly for business
Social engineering attacks are widespread, frequent and cost organizations thousands of dollars annually according to new research from security firm Check Point Software Technologies. Read More

Bigger isn't better when it comes to social engineering attacks
When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point. Read More

Open this malware or I'll sue you
The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop. Read More



SLIDESHOWS

16 essential Android apps for IT pros
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Need switches? Buy now, report says
  2. Privacy stink erupts over Borders bankruptcy deal
  3. Lane defends HP decision to name Whitman CEO
  4. Next-gen boot spec could forever lock Linux off Windows 8 PCs
  5. MySQL moves closer to closed
  6. Lync not enterprise-ready, claims Microsoft ISV-turned-rival
  7. Microsoft Hyper-V and Cisco Nexus 1000V: A proverbial win-win
  8. HP board ousts Apotheker, Whitman in as CEO
  9. Open this malware or I'll sue you
  10. Cisco: Is the Internet as important as food, water, air, shelter?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: