Friday, May 18, 2012

Hospital system pursues identity-management Holy Grail

Smartphone security is heading for 'apocalypse' | Rogues gallery 2: Ten infamous hacks and hackers

Network World Compliance

Forward this to a Friend >>>


Hospital system pursues identity-management Holy Grail
It's an ideal in identity management: a centralized role-based access control system that supports single-sign-on (SSO) user access to authorized applications tied into the human resources systems for automated provisioning and de-provisioning, and the ability to integrate physical-security identity badges for room access. Read More


WHITE PAPER: NetIQ

Simplify Compliance and Security
This introduction to NetIQ Sentinel Log Manager provides insight into a flexible and cost-efficient software appliance that lights a clear path to complete, real-time, identity-aware security information and event management. Learn More!

In this Issue


WHITE PAPER: Centage Corporation

Centage/IOMA Budgeting Survey: Benchmarks & Issues
How are other financial professionals dealing with the issues you face? This report offers you an inside peak into what the minds at over 200 financial executives are thinking and doing to impact their own bottom line. Learn more.

Smartphone security is heading for 'apocalypse'
The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands into what has been dubbed an "apocalypse." Read More

Rogues gallery 2: Ten infamous hacks and hackers
From low-profile intrusions to statement-making break-ins, here are 10 headline-making system intrusions (and the culprits behind them) Read More

Equifax Eyes Are Watching You--Big Data Means Big Brother
As one of three credit bureaus in the United States, Equifax keeps financial data on every adult in America, plus people in 16 other countries. But the company knows much more than just what goes into an old-fashioned credit score. Read More

The fantastic world of steampunk technology
Steampunk design has taken root in everything from computers to iPhones Read More

Companies slow to react to mobile security threat
Nearly a third of IT managers have reported a security threat as a result of personal devices accessing company data, Juniper finds Read More


WHITE PAPER: Aruba Networks

Gartner recommends up to 300% more Wi-Fi to support iPads!
Tablets, like the iPad, are becoming more prevalent in the enterprise. Execs, doctors, teachers, and sales people are demanding more access to corp. apps and resources over their mobile devices. According to Gartner, the limited networking capabilities of the iPad will force IT departments to increase Wi-Fi capacity by 300%. Learn More

Adobe backpedals, will now patch software for free
After being pummeled by customers and security experts for telling users to spend hundreds of dollars on upgrades because it wasn't going to patch critical bugs in older versions of its software, Adobe has reversed course. Read More

How to start a business continuity program
Sometimes you pull the short straw. Read More

Thwarted by security at enterprises, cyber criminals target SMBs
Big business -- at least a significant percentage of it -- has apparently heeded the decades-long mantra from information security experts, and invested enough in security to make it difficult, expensive and risky for cyber criminals to attack them. Read More

Intel incorporates security, management into Core vPro processors
Intel today described management and security capabilities that will be part of its new Intel Core vPro processor family used in PCs, tablets, laptops and intelligent systems. Read More

INSIDER
Privacy advocates fear CISPA
Privacy advocates are riled up after the recent passing of the controversial Cyber Intelligence Sharing and Protection Act by the House, which occurred despite opposition from privacy advocates, lawmakers and the White House. Read More


WHITE PAPER: FireEye

Why They are Successful and How to Stop Them
Why is spear phishing on the rise? Quite simply, it works. Traditional securitydefenses simply do not stop these types of attacks. Learn more in the FireEye Advanced Threat Protection KnowledgeVault. Learn more.

Forrester outlines 5 rising, 5 declining security technologies
Security technologies rise and fall in popularity, and Forrester Research in its TechRadar report puts its bets on five it thinks are in a growth mode and five it thinks are dying away. Do you agree or disagree? Let us know. Read More

Hackers break into bitcoin exchange site Bitcoinica, steal $90,000 in bitcoins
Bitcoin exchange site Bitcoinica suspended its operations on Friday after hackers managed to steal 18,547 bitcoins -- valued at about US$90,000 -- from its online wallet. Read More

Apple releases security update, Flashback removal tool for Leopard
If you still cling to Leopard like I cling to 80s music, good news: Just as I haven't forgotten Right Said Fred, Apple hasn't forgotten you. The company on Monday released a pair of security updates for the older operating system: Leopard Security Update 2012-003 and Flashback Removal Security Update. Read More

A Secure BYOD Policy at MasterCard? Priceless.
More than a year into its bring-your-own-device program, MasterCard Worldwide continuously assesses the security technology and policies that allow 30 percent of its employees worldwide to use their personal iPhones, iPads and Android devices at work. Read More

Wikipedia warns users about malware injecting ads into its pages
Rogue browser extensions might inject commercial ads into Wikipedia pages, Wikimedia Foundation said Read More



SLIDESHOWS

10 ways to make Android faster, more productive and more secure than iPhone
iPhone users love to brag about their phones. Yet, for many users, Android is clearly the superior platform.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Wozniak reveals why Steve Jobs loved secrecy
  2. Verizon LTE expansion continues with 28 more cities
  3. Verizon to kill unlimited data for all users, offer shared data plans
  4. Smartphone security is heading for 'apocalypse'
  5. VMware going 'All in' with BYOD
  6. Tech managers aren't doing a good job developing IT talent
  7. This is why people pirate Windows
  8. Why Israel is a hotbed for flash storage innovation
  9. FBI finds scammers impersonating the FBI now one of the worst online threats
  10. HTC phones banned in U.S. after Apple patent win

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: