Search This Blog

Monday, April 26, 2010

Taking a look back at the future

FBI: Finding criminal data on cell phones and game consoles is tough | 1.5 million stolen Facebook IDs up for sale

Network World Security: Identity Management

Forward this to a Friend >>>


Taking a look back at the future
Remember when magazines, newspaper articles, books and movies took a stab at predicting what the dawn of the 21st century would be like? The jet-cars, robot servants – the transporter (what happens if you transport through volcanic ash, I wonder)? Well, 10 years ago in this newsletter I took a stab at it: Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

FBI: Finding criminal data on cell phones and game consoles is tough
Non-traditional communications devices such as smartphones and game consoles pose a particular problem to law enforcement agencies trying to milk them for forensic data that reveals criminal activity, attendees were told at the 2010 Computer Forensics Show in New York City. Read More

1.5 million stolen Facebook IDs up for sale
A hacker named Kirllos has a rare deal for anyone who wants to spam, steal or scam on Facebook: an unprecedented number of user accounts offered at rock-bottom prices. Read More

Managers: Get on the security bandwagon
Dear Managers: Help Wanted! Read More


WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Learn More

Violent Apple iPad theft caught on video
A US Apple Store customer lost most of his little finger when a thief struck grabbing his newly purchased Apple iPad. Read More

NASA wants public to join in Hubble Telescope's 20th anniversary extravaganza
The Hubble Space Telescope has taking snapshots of the universe for 20 years this week and as part of that anniversary, the space agency is looking to crowdsource new galaxy images and promote social network celebrations.  Read More

New tool makes end users responsible for data loss prevention
When there is a real-time alert, someone in IT has to make a decision: let the action go or quarantine the data. This is too time-consuming, and it requires IT to inspect the data. Check Point Software Technologies just introduced a DLP solution that puts the onus for remediating the alert onto the worker who triggered it. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

You Don't Have to Remember Your Passwords
Coolfoster asked the Answer Line forum for a secure way to remember passwords Read More

SEC workers spent hours at work watching online porn
Several senior SEC staffers spent hours daily watching porn on their work computers even as the massive financial crisis was unfolding in 2008, according to agency's inspector general. Read More

Cyber Stowaways
Here is another must read New York Times article providing more details about the cyber attack at Google: http://www.nytimes.com/2010/04/20/technology/20google.html?src=busln Read More

Why Are There Still So Many Problems with The Federal Cybersecurity Effort?
On May 29th of 2009, President Obama declared: "It's now clear that this cyber threat is one of the most serious economic and national security challenges we face as a nation." At FOSE this year, FBI Deputy Assistant Dirctor, Stephen Chabinsky gave this ominous statement, "Cybercrime and cyber terrorism could be a game changer and thus represent an existential threat to our nation." Read More

Top 5 Security No Brainers for Businesses
Occasionally folks forget about covering the fundamentals of security and start off down a rabbit hole following some shiny new technology that turns out to be just a rat hole. With today's limited security budgets you need to be sure that you've adequately covered your highest risk areas before moving on to other things. The high-risk areas are, of course, not the same for everyone and will change... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Confessions of tech hoarders
  2. Google, YouTube received 10,000 gov't requests for user data
  3. McAfee apologizes for PC anti-virus snafu
  4. McAfee's DAT 5958 debacle goes on
  5. Steve Jobs: Savior or tyrant?
  6. 5 hot IT certification picks for 2010
  7. Cisco's move to open-source its Telepresence is genius
  8. Flawed McAfee update paralyzes corporate PCs
  9. Recovering from the flawed McAfee update
  10. Other top-secret Apple projects found at a bar

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: