Search This Blog

Wednesday, July 27, 2011

When will we ever learn?

Network World Security: Identity Management - Newsletter - networkworld.com
Black Hat Pwnie Award winner will be a criminal | Black Hat: Embedded Web servers open printer, scanner security holes

Network World Security: Identity Management

Forward this to a Friend >>>


When will we ever learn?
I mentioned last issue a number of proposed identity protocols (Passport, Cardspace, OpenID, DigitalME, et al.) that have either died or, so far, failed miserably. There's a new entry in the so-called "user-centric" ID space that shows all the signs of following that path. Read More


WHITE PAPER: Motorola

Less Cost and Congestion. More Performance and Trust
Giving brainpower to WLAN access points results in: • Intelligent direct routing • Network-aware access points that can easily reroute around overloaded components • Detection of RF interference • AP flexibility and options from AP 621 to AP 7181 Read now!

WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Black Hat Pwnie Award winner will be a criminal
Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees face possible criminal charges. Read More

Black Hat: Embedded Web servers open printer, scanner security holes
It's fairly simple to find corporate or consumer printers and scanners online and, without breaking into them, get a hold of documents that these devices recently processed. Read More


WHITE PAPER: Kaseya

Why Corporations Need to Automate IT Systems Management
In today's competitive business environment, corporations across all industries are looking to provide quality products and services while at the same time cutting costs, saving energy and doing more with less. Automated IT systems management is the ultimate facilitator for achieving these goals…and more. Read now

Confusing array of security job titles complicates Pentagon cyber warrior strategy
As the US Department of Defense wrangles with cybersecurity and organizes for potential online warfare, it faces a number of big challenges - not the least of which is managing to get the right people in the right jobs. But with the DoD such a task isn't so easy. Read More

Coming to a store near you: health insurance exchanges
By 2014, states must deploy public health insurance exchanges, giving millions of Americans purchasing power that could change the landscape for health insurers. Private retailers are already eying their own online exchanges -- possibly as in-store kiosks. Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Zurich lawsuit against Sony highlights cyber insurance shortcomings
A brewing legal dispute between Sony and one of its insurers over data breach liability claims highlights the challenges that companies can sometimes face in getting insurance companies to cover expenses arising from cybersecurity incidents. Read More

Google works to soothe users over real name controversy
Google has heard the public outcry about its name restrictions and the way it killed off many Google+ user accounts and is working fast to fix the problem. Read More

E-health records still scare most of us
Consumers just don't trust electronic health records to securely store their personal information, according to a survey by Harris Interactive. Read More

DARPA program wants to coral zany social media world into a science
Looking to reign-in the sort of wild-west atmosphere that can surround social media outlets, military researchers at the Defense Advanced Research Projects Agency are offering $42 million in grants to develop what it calls a new science of social networks. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: