Hacking image via Shutterstock
Major security surveys and reports continually show that passwords are one of the greatest weaknesses on enterprise networks. Criminal hackers exploit weak passwords for their ill-gotten gains as do malicious employees and other insiders. Even advance malware can take advantage of weak passwords. Something has to change. But you can’t fix what you don’t acknowledge. That’s why Kevin Beaver’s book, Hacking for Dummies: 4th edition, presents the latest tools and techniques you can use to cover weak passwords in your environment and to minimize password risks once and for all. We have an excerpt of the book on our IT Bookworm Blog.
Since we’re feeling generous, we’re giving away five more copies of the book, all signed by Kevin Beaver himself! To win a copy, tell us “What do you believe is the greatest contributor to information security problems in your organization, or if you’re not into self-incrimination, society as a whole?” Good luck!]]>
Blog image via Shutterstock
Cloud computing, security, mobile, storage…these topics were all included in ITKE’s top blog posts for April. Find out what our bloggers were saying about each topic.
Identity security image via Shutterstock
Join us on May 7th at 11:00 AM EST for an exclusive live web chat with expert Peter H. Gregory who will answer your questions on planning your enterprise IAM integration.
The world in which successful IAM programs must be implemented is increasingly complex. This includes a mix of legacy on-premise IAM infrastructures, cloud-based IDaaS for hybrid cloud infrastructures, and mobile devices that are either an authentication token in disguise or a disaster waiting to happen. This supercast will lay out the pitfalls and opportunities of moving your current IAM solutions forward into highly integrated scenarios. How can IAM be delivered cost effectively? What are the emerging threats to these more exposed systems? What are the strategic advantages to forward-thinking IAM deployments? Expert Peter H. Gregory will answer all these questions and try to provide you with the right IAM program. Register today!]]>
Hacking image via Shutterstock
For many IT professionals, ‘hacking’ is one of the scariest words. From passwords to banking accounts, hackers are constantly looking for ways to breach your network. But don’t worry, Kevin Beaver’s book, Hacking for Dummies: 4th edition, takes you into the mind of a hacker and gives you the latest tools and techniques to stop them before they strike. We have an excerpt of the book on our IT Bookworm Blog.
We’re giving away 5 copies of the book, all signed by Kevin Beaver himself! To win a copy, tell us “Of all the challenges that come with working in IT, what are the top three that keep you from getting the most important things done?” Good luck!]]>
Senior Site Editor for searchSecurity.com, Eric Parizo (@EricParizo) and Greta Lindberg (@TT_Edit_Events) will moderate a lively discussion with Mike Arpaia (@mikearpaia), Security Consultant with iSEC Partners and Diana Kelley (@securitycurve), Founder of research and consulting firm SecurityCurve, covering topics including:
Reminder: #ISDCHICAGO2012 TweetChats are a marketing-free environment! Join the chat to connect, learn and get excited for our upcoming show on October 23rd – please no product-specific postings.
It’s easy to join the Twitter conservation by logging into the #ISDCHICAGO2012 TweetChat Room, which automatically keeps you in the conversation by tagging all tweets with the #ISDCHICAGO2012 hash tag. If you are unable to access the TweetChat room, simply search in Twitter for #ISDCHICAGO2012 and tag your tweets with #ISDCHICAGO2012 so they can be seen by everyone else.
If you have any questions, please contact Greta Lindberg of TechTarget Editorial Events at email@example.com.
1. Mr Denny has a message for the SQL community: Stop using SQL logins!
2. Randy Kerns ponders why Katie Holmes left Tom Cruise and guesses what will be done with their data records.
3. Are you having trouble with completing your SSL handshake in NRPE? Expert Eric Hansen provides the answer.
4. Marcia Savage calms user fears by explaining Yahoo’s solution to its password breach.
5. Todd Morrison announces the SAP BusinessObjects 4.0, Feature Pack 3 release date and details the new features.
6. Sharon Fisher reports on what she found in the new Gartner Enterprise Backup/Recovery Magic Quadrant.
7. Do you know the difference between ‘racking’ and ‘wracking’? Ivy Wigmore tells you the answer.
8. Nathan the IT guy announces the big news: Users can now pre-order the Google Nexus 7 from Canadian retailers.
9. Leah Rosin reports on Microsoft’s changes to the Microsoft Office 365 channel program.
10. Robert Westervelt talks to Trey Ford, general manager of Black Hat 2012, about the upcoming Black Hat security conference.
Michael Tidmarsh is the assistant community manager for ITKnowledgeExchange.com.]]>
Join us at the 20th USENIX Security Symposium, August 8-12, 2011, in San Francisco, CA.
Whether you’re a researcher, a system administrator, or a policy wonk, come to USENIX Security ’10 to find out how changes in computer security are going to affect you. The 5-day program includes in-depth tutorials taught by industry leaders including Richard Bejtlich, Jim DelGrosso, Rik Farrow, and SANS; a comprehensive technical program, including a keynote address by Charles Stross, Author of award-winning science fiction; invited talks; a refereed papers track, including 35 papers presenting the best new research; and a poster session. Learn the latest in security research, including securing smart phones, understanding the underground economy, privacy- and freedom-enhancing technologies, and more.
Register by July 18 and save! Additional discounts available.]]>
This transformation journey is never just about the network. A transformative solution represents a fundamental shift in the way an operator designs, deploys, manages, and supports network and IT infrastructure to deliver new, differentiated value for customers. Ultimately this transformation must satisfy specific, unique transformation priorities — while giving service providers the capability to develop economic models or business models that engage the new value chain, increase the value of the connectivity they deliver, and provide a network that can support their full set of business aims into the future.
On April 7 from 10am to 1pm EDT, attend our Live Chat to discuss real-world examples of service providers implementing transformation projects to become more innovative, competitive, simpler, faster and more efficient; while improving customer quality of experience and laying a solid foundation for the future.
To learn more or get a reminder email for the live chat, visit the Alcatel-Lucent live chat page.]]>
In attempt to continue upgrading IT Knowledge Exchange’s capabilities, features and speed, we will be completing a server move from hosted to in-house. This move will support the continuous growth that we’re experiencing in traffic and activity–all thanks to your efforts!
This move will take place tomorrow, Wednesday, December 8, 2010, after 5pm EST. You should experience a couple hours of downtime, but don’t worry because we’ll be back and better than before!
If you have any questions or notice anything strange, please don’t hesitate to contact us.]]>
Register by October 18 and save up to $300! Additional discounts are available.]]>