Search This Blog

Wednesday, March 24, 2010

Privacy as a contract

Is your city a cybercrime center? | Hot space projects produce cool cosmic discoveries

Network World Security: Identity Management

Forward this to a Friend >>>


Privacy as a contract
The Federal Trade Commission held a roundtable -- actually a series of talks and panels -- last week on the issue of privacy. The commission, it seems, is worried that rules to protect privacy have not kept up with technology. But is government in general and the FTC, in particular, the right place to create privacy rules? Should there be privacy rules at all? Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

Is your city a cybercrime center?
Are some cities in the U.S. worse in terms of cybercrime than others? Read More

Hot space projects produce cool cosmic discoveries
In the past month or so there has been a plethora of wicked cool discoveries coming from NASA satellites and space-watching missions across the globe. Never-before-seen photos of Jupiter's Great Red Spot, Mars moon Phobos, black hole formation and a new exoplanet are just a few of the amazing images. Read More

Top U.S. domain name registrars lag on DNS security
The leading domain name registrars in the United States appear to be dragging their feet on the deployment of DNS Security Extensions, an emerging standard that prevents an insidious type of hacking attack where network traffic is redirected from a legitimate Web site to a fake one without the Web site operator or user knowing. Read More


WHITE PAPER: Ultrium

Cost Effective Data Security with Tape
With a growing number of laws and regulations, financial penalties, and public notification costs, a security breach can be costly for corporations. Data managers are called upon to develop effective security for sensitive data and are turning to tape encryption. Read Now

Privacy as a contract
The FTC held a roundtable -- actually a series of talks and panels -- last week on the issue of privacy. The commission, it seems, is worried that rules to protect privacy have not kept up with technology. But is government in general and the Federal Trade Commission, in particular, the right place to create privacy rules? Should there be privacy rules at all? Read More

Mozilla extends security tool to other browsers
Mozilla is preparing a tool to give users of rival browsers, including Internet Explorer (IE), Chrome, Safari and Opera, a way to find out whether important add-ons are up to date. Read More

The battle for Internet freedom
What are we permitted to post legally on the Internet? Who is responsible for the content of materials posted on Web sites? Two recent legal cases have highlighted the ongoing battles over control of information being posted on the Internet. Read More


DOWNLOAD: RIM

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Now.

A case of mistaken identity involving Snopes.com
People tend to get lost on the Internet and I do not mean lost in thought or mindless drivel, though these things are true, too. I mean lost as in they don't know where the heck they are. Read More

As health data goes digital, security risks grow
The amount of online private medical information is expected to grow from terabytes today to petabytes over the next four years, exposing electronic health records to ever more serious data breach threats. Read More

Why to Quit Facebook And One Reason to Stay On
Last year, Baby Boomers quit Facebook at a faster pace than they joined. Read More

High school Webcam follies, part II: Dumb and dumber
Though it's not getting quite the 24/7 cable news treatment as it garnered when it first hit the wires, the Webcam scandal in Southeastern Pennsylvania (aka "Webcamgate") is still twisting and turning in unpredictable ways. We still don't know exactly what happened, but we do know there are lessons here for everyone concerned about IT security and personal privacy. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. The biggest cloud on the planet is owned by ... the crooks
  2. 25 awesome tech products at DEMO
  3. 10 hot data center tools
  4. Multicore requires OS rework, Windows architect advises
  5. Is your city a cybercrime center?
  6. German government urges to scrap Firefox 3.6
  7. Cisco, HP rift grows
  8. The BlackBerry-to-iPhone switch: Converts speak
  9. DEMO starts with violent death of a fax machine
  10. Why to quit Facebook and one reason to stay on

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: