Wednesday, January 16, 2008

Bill Gates has no identity

Security: Identity Management Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile

SPONSORED BY COURION CORPORATION
rule

White Paper: Role Management Strategies
Download the latest white paper from Courion, the provisioning and access compliance experts, detailing best practices and considerations around how role-based provisioning can deliver simplified user administration, efficient user provisioning, and improved compliance and risk management, as well as learn from Courion's experience-based approach to helping customers achieve their desired results.

rule

SPOTLIGHT STORY
Bill Gates has no identity

Dave Kearns By Dave Kearns
If you've ever heard Bill Gates speak, you know that he has the vocal charisma of a frog serenade accompanied by chalk on a blackboard. Yet he almost always speaks to standing room only crowds as he did at last week's Consumer Electronics Show (CES) in Las Vegas. Back in 1998, when Gates keynoted Comdex in Vegas, I asked the first people in line how long they had been waiting to get in - they had been there a full 7 hours before the speech just to be sure of getting "a good seat." If it isn't his presence, or his deathless prose or even the cadence of his delivery - what is it that keeps people waiting in line to hear him? Read full story

Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here

RELATED NEWS:

Podcast: Top Identity Management trends for 2008 As part of our Prediction Week of podcasts, we talk with David Ting from Imprivata about the top identity management predictions and issues for the year. Learn about the swing back to thin-client computing (through virtualization), whether enterprises are truly ready for biometrics, and why the insider threat will be even more important in 2008.

Nashville laptop theft may cost $1 million, 01/14/08 The theft of a laptop containing Social Security numbers of Nashville, Tennessee, area voters is expected to cost local officials about $1 million as they roll out identity-theft protection to those affected.

Congressional report rips U.S. TSA Web site security, 01/11/08 A Web site commissioned by the U.S. Transportation Security Administration (TSA) to help travelers whose names were erroneously listed on airline watch lists originally had multiple security problems that could lead to identity theft, says a congressional report released Friday.


WORTHWHILE WEB SITES
20 most useful Web sites for IT professionals For both work and pleasure, here are 20 useful sites for IT professionals.

ASK THE MAGIC '08 BAll
CES International 2008 Take a look at the eight hottest technologies for 2008.

SPONSORED BY COURION CORPORATION
rule

White Paper: Role Management Strategies
Download the latest white paper from Courion, the provisioning and access compliance experts, detailing best practices and considerations around how role-based provisioning can deliver simplified user administration, efficient user provisioning, and improved compliance and risk management, as well as learn from Courion's experience-based approach to helping customers achieve their desired results.

rule

Featured Webcast for Newsletter Subscribers
Improve App Performance with Web Acceleration. Find out how to improve the delivery of Web applications to geographically dispersed users with Web acceleration tools. Learn how to shop for these products and find out what the best and worst applications are. http://www.accelacomm.com/jlp/PSA2_80162151/7/80162151/

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/16/08

TODAY'S MOST-READ STORIES:

  1. Eight hot technologies for 2008
  2. Microsoft's response to Xbox's wireless signal
  3. Young IT workers disillusioned
  4. How much do big-name CIOs make?
  5. Trojan intercepts online banking information
  6. Web sites rigged with advanced hacking attack
  7. A new Outlook (file)
  8. Apple iPhone doomed to failure
  9. Not buying Microsoft's MediaCart
  10. IBM retains lead among patent winners

MOST E-MAILED STORY:
The IT department is dead, author argues


Executive Guide: A roadmap to compliance

Learn the latest on how to more easily and cost effectively comply with regulations in this informative Executive Guide from your trusted news source Network World. Discover the latest trends in NAC and get an overview on the corporate security threat landscape.

Download this Executive Guide now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Identity Management Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2008

 

 



1 comment:

  1. Anonymous11:44 PM

    It is a very useful blog for home and commercial security for those who are concerned about security, as I have got from Collapsible Security Gates .

    ReplyDelete