Friday, August 19, 2011

NSTIC director: 'We're trying to get rid of passwords'

Can the Obama Administration fix your identity management problems? | With SSL, who can you really trust?

Network World Compliance

Forward this to a Friend >>>


NSTIC director: 'We're trying to get rid of passwords'
The federal government's National Strategy for Trusted Identities in Cyberspace (NSTIC) program is trying to identify more secure alternatives to simple passwords that the government as well as anyone else might use in authenticating to online applications. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Remote Support for PCs, Macs, Tablets and Smartphones
Provide instant, on-demand remote support with LogMeIn Rescue. Without pre-installed software, quickly connect to PCs, Macs and smartphones anywhere in the world. Get in, solve the problem

WHITE PAPER: CA Technologies

The Arrival of Cloud Thinking
Much is being made of the "the cloud." The money it will save. The agility it will bring to computing. What is less obvious is how IT departments are actively employing cloud services today. How they are reacting to both public and private cloud initiatives. What it will mean over the next couple of years for IT decision makers and implementers. Learn More

Can the Obama Administration fix your identity management problems?
Can the Obama administration fix your identity management problems? Read More

With SSL, who can you really trust?
SSL, the encryption scheme that protects virtually all secure online transaction, requires that users rely on trusted third parties, but what if they can't be trusted? Read More


WHITE PAPER: GFI Software

Email Security in Small and Medium-sized Businesses
No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now

Linux Foundation releases specification to ease licensing headaches
The Linux Foundation and FOSSBazzaar on Wednesday released a new specification to ease the pain of license compliance for open source software. The Software Package Data Exchange (SPDX) is a data exchange specification that tracks license information in a standardized way and allows it to travel across the software supply chain. Read More

DoD: Sharing cyber-threat info with contractors is working
Halfway through a 90-day trial, the Department of Defense says it has stopped hundreds of attempted intrusions it would have missed otherwise without its pilot program of sharing classified information about cyber threats with military contractors. Read More


WHITE PAPER: Schooner Information Technology

The Short Guide to MySQL High-Availability Options
The Short Guide to MySQL High-Availability Options: An analysis of today's MySQL high-availability challenges and what asynchronous, semi-synchronous and fully synchronous replication offer toward reducing downtime, achieving full data consistency, automating failover, and simplifying administration. Read now!

MIA talk was to focus on Android developer mistakes
A lack of code checking and security education has led to dozens, if not hundreds, of application security flaws that affect the Android platform, researchers claim. Read More

Cellular and Freedom of Speech: The BART Case
I've been on the road the past two weeks - Washington, Denver, and, most recently San Francisco. While in SF, the news outlets were ablaze with a developing story on how Bay Area Rapid Transit (BART), the area's high-speed metro rail service, turned off cellular service underground last Thursday when word of an organized protest (as in what we saw recently in the Middle East) recently spread. Read... Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. 20 years of Linux: Then and now
  2. The collar bomber's explosive tech gaffe
  3. The world's geekiest license plates
  4. Dropbox cloud was a haven for data thieves, researchers say
  5. 10 scariest hacks from Black Hat and Defcon
  6. Linus Torvalds: ARM has a lot to learn from the PC
  7. Next-gen iPhone rumored to launch on Oct. 7
  8. Outsourced and fired, IT workers fight back
  9. On Linux's 20th anniversary, recounting past slights from Microsoft
  10. Whatever happened to Microsoft Forefront Endpoint Protection?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: