Search This Blog

Wednesday, September 28, 2011

Journey's end

 
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Journey's end
Time to pack up and head out, the Security Identity Management Alert will be no more. Still, I couldn't leave you without some final words of advice, could I? Read More
 

EDITOR'S NOTE

Thank you for subscribing to the Security: Identity Management newsletter. Starting next week, your subscription will be switched to the Security News Alert newsletter. If you wish to unsubscribe at any time, you may do so with this link.  Click Here


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

WHITE PAPER: GFI Software

Social Networking and Security Risks
Each social networking tool comes with its own set of security concerns which can put your information systems and/or personal data at risk. This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data. Read now!

Borders' customers will have to opt-out after Barnes & Noble agrees to acquire database
After arguing in court over privacy concerns from the sale of bankrupt Borders customer loyalty database to Barnes & Nobel, the lawyers in the case agreed to email customers and give them 15 days to opt out of the system. Read More

IBM Demonstrates Secure Product Development Leadership
It's easy to believe that the folks who design, develop, and distribute the technology we use know what they are doing and have our collective best security interests in mind. Sadly, this isn't at all true. Many vendors focus solely on feature/functionality and disregard security in their product development and manufacturing. Others downplay risks believing that their technology sits well "behind... Read More

Microsoft offers ideas for users to beat the BEAST threat
Microsoft is urging customers to update vulnerable versions of SSL to a newer one that is not susceptible to a recently published exploit called BEAST, but in the meantime it recommends steps that lessen the risk of being victimized. Read More


WHITE PAPER: GFI Software

Protecting Against the New Wave of Malware
Learn why traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats. Read now!

Al-Qaida's Shamukh chat forum under attack, says expert
Al-Qaida's top-tier Al-Shamukh chat forum is facing an ongoing electronic attack, that has rendered the forum totally unreachable, according to a terrorism expert. Read More

Scammers pretend to be friendly office printers
Hackers have found a new hook to trick people into opening malicious attachments: send emails that purport to come from office printers, many of which now have the ability to email scanned documents. Read More

US senator wants FTC to put heat on "brazen" OnStar for privacy changes
US Senator Charles Schumer (D-NY) sent a letter to the Federal Trade Commission to get the agency to investigate recent changes made to navigation and emergency services company OnStar made to its privacy practices. Read More

Apple updates OS X to block Mac Trojan
Apple has updated the bare-bones antivirus protection included with Mac OS X to detect a Trojan horse that poses as a PDF document. Read More


WHITE PAPER: GFI Software

Security Considerations for SMEs
It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it. Read now!

Striking a domain provider, Microsoft kills off a botnet
Microsoft has opened a front in its ongoing battle against Internet scammers, using the power of a U.S. court to deal a knockout blow to an emerging botnet and taking offline a provider of free Internet domains. Read More

Top 10 banned books of 2010
The American Library Association this week observing its 13th annual Banned Book Week where it takes a look at censorship and all manner of literary issues. The ALA says the Banned Books list was started in 1982 as a "response to a sudden surge in the number of challenges to books in schools, bookstores and libraries." Read More

Concern over U.S. snoops drives Canadian political party to cloud-based encryption
One of Canada's largest political parties is using cloud-based Salesforce.com in the U.S. to store information about voters and interact with them, but worries that U.S. government snoops could peek at sensitive information under U.S. law prompted the Canadian party to use a strong encryption approach. Read More

NSA Label-based System Could Secure Big Data
The National Security Agency has submitted Accumulo, its label-based, data-store software, to the Apache Software Foundation so that other parties can further develop the technology for use in secure systems. Read More

 
 
 

SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Is quantum computing real?
  2. Amazon's new tablet: What to expect
  3. Top 10 banned books of 2010
  4. How NYPD, citizen media use technology at Occupy Wall Street protests
  5. vSphere 5 sets the virtualization bar
  6. IT job search: An expert guide
  7. U.S. senator wants FTC to put heat on 'brazen' OnStar for privacy changes
  8. 9 hot IT skills for 2012
  9. Al Gore says Apple will release two iPhone models in October
  10. Splunk explains it all
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: