Search This Blog

Wednesday, February 24, 2010

Passlogix announces V-GO Universal Authentication Manager

FTC P2P data leak alarm could give law-makers big stick | Five Security Missteps Made in the Name of Compliance

Network World Security: Identity Management Alert

Forward this to a Friend >>>


Passlogix announces V-GO Universal Authentication Manager
Passlogix' V-GO Simplified Signon product has ben around a long time, and it's still going strong, with more licensees then ever. And Passlogix does that one thing so well that the list of other vendors that license the product reads like a "who's who" of the identity market. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

WHITE PAPER: Ultrium

Cost Effective Data Security with Tape
With a growing number of laws and regulations, financial penalties, and public notification costs, a security breach can be costly for corporations. Data managers are called upon to develop effective security for sensitive data and are turning to tape encryption. Read Now

FTC P2P data leak alarm could give law-makers big stick
The FTC said companies and institutions of all sizes are vulnerable to serious P2P-related breaches, placing consumers' sensitive information such as health-related information, financial records, and drivers' license and social security numbers at risk for identity theft. Read More

Five Security Missteps Made in the Name of Compliance
In the hurry to meet a regulatory compliance deadline, companies risk making some costly security mistakes. Here are five examples. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

Attackers going after end users rather than servers
The Web traffic study also finds issues with botnets, corporate policies, and outdated browsers Read More

When schools spy on their students, bad things happen
Sometimes even I am blown away by how mind-numbingly stupid people can be when it comes to technology. I'm not talking about people who can't find the "any" key. I'm talking about institutional stupidity, the kind you only get when you mix technophobic bureaucrats and geeks with no sense of boundaries. Read More


WEBCAST: Sybase

op 5 Best Practices for Managing Mobility
The mobile world today is similar to that of the personal computer world of the early 1980s: it is begging for IT management to ensure a productive and secure user experience. This Webcast offers best practices designed to get IT started on the road to comprehensive mobile management and security. View Now

Cisco gaining mindshare in security, says research firm
A survey of 259 information security professionals shows Cisco gaining clout with them as a network-security provider, according to research firm TheInfoPro. Read More

Virtualised USB key beats keyloggers
Is this the future of online banking? US company IronKey has come up with a USB drive that can be used to access accounts virtually without involving the operating system or applications that cause so many of today's security problems. Read More

Comcast launches first public U.S. trial of advanced DNS security
Comcast unveiled on Tuesday an aggressive plan to deploy new DNS security mechanisms that are designed to protect Web site operators and consumers from a specific type of hacking attack that involves hijacking Web traffic and redirecting it to bogus sites. Read More

Texas firm countersues bank in connection with $800,000 cyber theft
A Texas manufacturing firm has filed a lawsuit against a bank seeking the return of $200,000 stolen from its online bank account. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. Want a job? Get a computer science degree
  2. Beware the rogue Wi-Fi access point in Windows 7
  3. Cisco, Juniper, HP drive Ethernet switch market in Q4
  4. Best of the Tests 2010
  5. Fallout from Cisco, HP split
  6. Google's gigabit experiment a welcome prod in the side
  7. Cisco gaining mindshare in security, says research firm
  8. Chuck Norris botnet karate-chops routers hard
  9. Microsoft vs. Google: The empire strikes back
  10. Cisco and Juniper lost 10% of router market in 2009

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: