Search This Blog

Tuesday, September 04, 2007

The long road to identity services

Email not displaying correctly? View it in your browser. | Unsubscribe

Identity Management: The world of identity, simplified Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
The long road to identity services
Dave Kearns

By Dave Kearns
Conversations I've had recently with knowledgeable people in the industry are leading me towards a roadmap, or maybe an atlas – or, possibly, a timeline of identity services. That is, there seems to exist a continuum along which your identity projects should travel beginning with identifying the users and other objects in your system. Read full story

Contact author Dave Kearns at identity@vquill.com


SPONSORED BY
rule

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.

rule
RELATED NEWS:

AT&T laptop theft exposes employee data, 08/30/07: AT&T and Maryland's Department of the Environment have become the latest organizations to find out first hand why security analysts for some time now have advocated the use of encryption to protect sensitive data on laptops and other mobile devices.

Hacks hit embassy, govt email accounts worldwide, 08/30/07: Usernames and passwords for more than 100 e-mail accounts at embassies and governments worldwide have been posted online. Using the information, anyone can access the accounts that have been compromised.

Monster outlines antifraud measures, 08/29/07: One week after hackers stole personal information from millions of people who had posted their resumes to the job-searching site Monster.com, the company has warned its users to be vigilant about online fraud because the breach was not an isolated incident.

UN serves keylogger, Trojan after online attack, 08/28/07: The United Nations (UN) is the latest victim in a string of hacking attacks aimed at identity and credit card theft, and building botnet hordes.


TODAY'S MOST-READ STORIES:

1. Microsoft blames human error for glitch
2. Airline puts Linux PC in every seat
3. Vista SP1 beta on the way
4. PDF spam levels plummet
5. iPhone unlocking video hits Web
6. Windows Server 2008 delayed again
7. The metal-whisker menace
8. iPhone unlocker trades phone for 'sweet' car
9. How close is World War 3.0?
10. Deja vu: Sony uses rootkits, F-Secure says

MOST E-MAILED ARTICLE:

Airline puts Linux PC in every seat

SPONSORED BY
rule

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.

rule

IN THIS ISSUE:

09/03/07

AT&T laptop theft exposes employee data

Hacks hit embassy, govt email accounts worldwide

Monster outlines antifraud measures

UN serves keylogger, Trojan after online attack

Top news stories


cyber war abstract
WORLD WAR 3.0?
Inside the new reality of cyberwar.

ebay logo and picture of grilled cheese mary
EBAY ODDITIES
The 10 networkiest - and oddest - offerings on eBay.



Comprehensive Network Access Control
The new wave of sophisticated crimeware not only targets specific companies, but it also targets desktops and laptops as backdoor entryways into business operations and resources. Network access control enables proper configuration and security of user endpoints before they are allowed access on the corporate network. Click here to download this whitepaper.



IT Buyers guide

Security Buyer’s guide
From anti-spam to wireless LAN security, we've got detailed information on hundreds of products that will quickly help you pinpoint the hardware or software you're looking for.

 


To continue receiving Network World's Identity Management newsletter, please add @nwfnews.com to your white list.

PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: