Search This Blog

Monday, January 12, 2009

Is a pseudonym the same as a persona?

What can a persona include that a pseudonym can't?
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Novell
rule

Novell Make IT Work As One@novell.com
Experience a whole new level of interoperability with Novell. Our innovative Enterprise-wide Linux, Security and Identity Management, Systems Management and Collaboration solutions help to reduce cost, complexity and risk on virtually any platform. Learn how we can Make IT Work As One for you @ Novell .com

rule

Spotlight Story
Is a pseudonym the same as a persona?

Dave Kearns By Dave Kearns
We were recently having one of our interminable discussions on the Identity Gang mailing list (this was the privacy vs. anonymity discussion which dates back, oh, dozens of years) when Oracle's Nishant Kaushik - identity architect at Oracle and author of the Talking Identity blog - raised an interesting question: "Isn't a pseudonym the same as a persona [as defined in the identity management world, by my understanding]?" Well, there's nothing I like better than chewing over the meaning of words - so I did. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Data breaches rose sharply in 2008, says study More than 35 million data records were breached in 2008 in the U.S., a figure that underscores continuing difficulties in securing information, according to the Identity Theft Resource Center (ITRC).

Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying.

Watchdogs bite IRS for continued security lapses While it has made some progress in protecting and securing its data, the IRS continues to jeopardize the confidentiality, integrity, and availability of financial and sensitive taxpayer information.

3 Ways a Twitter Hack Can Hurt You Just days after popular social networking tool Twitter was hit was a phishing scam, the company is now trying to clean up a mess surrounding a separate hacking attack.

Hackers hijack Obama's, Britney's Twitter accounts Hackers hijacked the Twitter accounts of more than 30 celebrities and organizations, including President-Elect Barack Obama, Britney Spears and Fox News, early on Monday, the company confirmed today.

Kaspersky: Interview with a virus-hunter We recently got the opportunity to interview Eugene Kaspersky, the man behind Kaspersky Anti Virus. Here's what he had to say about the evolution of malware, the future of cybersecurity, the problems with the internet, and more.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Novell
rule

Novell Make IT Work As One@novell.com
Experience a whole new level of interoperability with Novell. Our innovative Enterprise-wide Linux, Security and Identity Management, Systems Management and Collaboration solutions help to reduce cost, complexity and risk on virtually any platform. Learn how we can Make IT Work As One for you @ Novell .com

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits.
Find out how to make it happen today.

 

01/12/09

Today's most-read stories:

  1. Windows 7 beta shows off task bar, UI goodies
  2. How the yellow first-down line actually works
  3. Outlook '09
  4. Microsoft research projects to improve our lives
  5. Ballmer sets loose Windows 7 public beta
  6. IBM employees buzzing about layoff rumors
  7. Google building own router to replace Juniper?
  8. CES 2009: Palm Pre leads gadget parade
  9. The five most dangerous security myths
  10. Best iPhone apps: Office and personal productivity


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: