Search This Blog

Monday, July 26, 2010

Likewise upgrades software; Radiant release white paper

  Government says DMCA can't stop jailbreaking, unlocking | Yahoo will invest in hackers with good ideas
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Likewise upgrades software; Radiant release white paper
Today we have a number of short, but important, announcements to pass on to you including a new software release, a new white paper and a new call to action. Read More


REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Government says DMCA can't stop jailbreaking, unlocking
Score this one 3-0 in favor of the Electronic Frontier Foundation over the corporate interests that have used the Digital Millennium Copyright Act (DMCA) to shackle and intimidate smartphone users and Internet video artists. Read More

Yahoo will invest in hackers with good ideas
Yahoo is considering investing in hackers with good ideas and technologies, a company executive said on Saturday. Read More

Enterprise UTM vs next-generation firewalls
Today we have a thoughtful contribution from security expert Patrick Bedwell, vice president, product marketing at Fortinet, the well-known provider of unified threat management systems. Patrick challenges the view that next-generation firewalls are a new and superior technology to unified threat management systems (such as the ones manufactured by Fortinet). Everything that follows is Patrick's own work with minor edits. Read More


WHITE PAPER: HP

Standalone Data Reduction Technologies
Data reduction technologies provide reliable and highly scalable storage solutions - with proven management and ease use that enable higher capacity utilization with less budget, time and energy. Learn about these technologies and how HP solutions can improve storage capacity utilization. Read Now

The quiet threat: Cyber spies are already in your systems
Special report: Electronic espionage from China and others could be stealing your vital product and business information right now Read More

Do Identity-Theft Protection Services Work?
Todd Davis is best known as the CEO of identity-theft protection company LifeLock who used his own Social Security number in his company's advertising as a sign of his confidence in the service. In May, it was widely reported that Davis's identity had been stolen at least 13 times. The controversy over LifeLock's advertising ultimately cost the company $12 million in fines. Read More

Cybercrime costs a business $3.8 million/year, study finds
A new study of 45 U.S. organizations found that cybercrime -- including Web attacks, malicious code and rogue insiders -- costs each one of them $3.8 million per year, on average, and results in about one successful attack each week. Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

12 Top Spy Gadgets
Spies are everywhere these days, from the 10 Russian agents nabbed recently here in the United States to the more glamorous Hollywood variety, such as is Angelina Jolie. In the movie Salt, Jolie plays Evelyn Salt, a CIA officer accused of being a Russian spy. Read More

How to clamp down on privileged users in a virtualization environment
Management and security, always a troublesome twosome, have reared their ugly heads yet again. This time, they're causing problems for virtualization initiatives, quashing deployment plans while IT managers grapple with how to finesse management and security of the virtual machines moving around the server infrastructure. Read More

IBM takes dim view of EU claims "being made by Microsoft and its satellite proxies"
IBM responded angrily to the claims behind investigations being brought by the European Union today that the company has abused its dominant market position in mainframe computers. Read More

US awards $122M for new lab that will spin sunlight into fuel
Making clean fuel out of sunlight is the idea behind a $122 million US Department of Energy award to a team of California researchers. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Say what?
Earlier this month, Microsoft's chief operating officer made a statement that sent everyone's jaws a-dropping. "It looks like the iPhone 4 might be their Vista, and I'm OK with that," he said during a keynote speech at the company's annual partner conference. It got me thinking about quotes that have and will go down in history from the industry's most famous executives. Can you guess who made the following statements?

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. WPA2 vulnerability found
  2. Apple grants ABC access to its secretive "black labs"
  3. Cisco study warns against "FarmVille"
  4. Avaya CEO on how to win over Nortel customers
  5. Massive sunspot can be seen with naked eye, but don't look
  6. Certified lies: Big Brother in your browser
  7. Microsoft signs big licensing deal with Arm chip technology
  8. Is Sprint losing its WiMAX/4G gamble?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: