Search This Blog

Wednesday, August 15, 2007

Identity makes its mark in the Linux world

Email not displaying correctly? View it in your browser. | Unsubscribe

Identity Management: The world of identity, simplified Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Identity makes its mark in the Linux world
Dave Kearns

By Dave Kearns
It was a busy week last week for the big boys of identity, Oracle and Novell, which made a fistful of major announcements at the most unlikely of places for identity news - the LinuxWorld conference. Read full story


SPONSORED BY

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.


RELATED NEWS:

Help shape digital reputations at Data Sharing Summit, 08/08/07: A bit over a year ago I wrote in a newsletter that social networking is rapidly becoming the testing laboratory for Internet technologies and identity management is no different - what's important from an identity management perspective in today's social networks will become important tomorrow in our business networks.

Make the cost of pilfering your asset higher than its value, plus other identity management, 08/01/07: I learned from Trusted Network Technology's PR guy George Robertson that, "With data costing companies $140 per lost record (Ponemon Institute) and selling well on the black market, business' data could actually be worth more than its finances - though it typically has far fewer controls." Interestingly enough, in a conversation I had last week with Securent's Howard Ting, we discussed the old truism that you should make the cost of pilfering an asset higher than its value while concomitantly keeping the cost of protecting that asset below the cost of replacing it.

Identity Governance Framework sprints to the finish line, 07/30/07: Setting a pace that the IETF and other slow-moving standards bodies could envy, the Liberty Alliance announced last week the completion of market requirements document (MRD) for the Identity Governance Framework (IGF). It also announced that development of technical specifications to meet use case requirements is now occurring both within Liberty's Technology Expert Group (TEG) and at openLiberty.org (home of open source tools to further the use of Liberty protocols).


TODAY'S MOST-READ STORIES:

1. Nude publisher Perfect 10 sues Microsoft
2. Vista prevents users from playing high-def content
3. Symantec patches critical Norton flaw
4. Vonage nearly done deploying patent workarounds
5. Google mistakes own blog for spam, deletes it
6. Storm Worm's virulence may change tactics
7. Kittens could solve spam
8. 802.11n WLAN tests show 'unbelievable' results
9. Cisco founder unveils the Next Big Thing?
10. Phishing researcher 'targets' the unsuspecting

MOST-DOWNLOADED PODCAST:
Twisted Pair: Philadelphia Wi-Fi freedom

SPONSORED BY

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.



IN THIS ISSUE:

08/15/07

Help shape digital reputations at Data Sharing Summit

Make the cost of pilfering your asset higher than its value, plus other identity management

Identity Governance Framework sprints to the finish line

Top news stories


NetworkWorld clear choice test: Nac
HUGE NAC TEST
Symantec beats Juniper, Cisco, others in test of 13 NAC products.

screaming face
HORROR STORY
How a network upgrade became years of glitches, snafus and legal holdups.



New Executive Guide
Network World has recently published an executive guide entitled "Virtualization Meets Reality". Find out the 8 key challenges of virtualizing your data center. Download it now!



IT Buyers guide

Security Buyer’s guide
From anti-spam to wireless LAN security, we've got detailed information on hundreds of products that will quickly help you pinpoint the hardware or software you're looking for.

 


To continue receiving Network World's Identity Management newsletter, please add @nwfnews.com to your white list.

PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: