Search This Blog

Wednesday, January 21, 2009

Start-up measures users' trustworthiness for authentication into sites

Start-up uses context-, risk-based scoring as an authentication method
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Radiant Logic
rule

Radiant Logic Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Spotlight Story
Start-up measures users' trustworthiness for authentication into sites

Dave Kearns By Dave Kearns
It never ceases to amaze me that as soon as I think some company is unique within a particular niche, another vendor comes along - sometimes three or four others - to occupy the same space. So it was that just after I submitted last week's newsletter about AdmitOne and its keystroke dynamics authentication method that I became aware of recent start-up Delfigo, which incorporates what it dubs "keyboard biometrics" into its multifactor authorization product. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Three years undercover with the identity thieves Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket.

Debit-card processor claims data breach part of global fraud operation Heartland Payment Systems, the Princeton, N.J.-based provider of credit and debit processing, payroll, check management and payments services to more than 250,000 business locations across the country, Tuesday disclosed it was the victim of a security breach.

AdmitOne adds security to realtors' MLS listings Ten years ago I wrote that fingerprint, retinal scan, facial recognition, signature analysis and even keyboard entry analysis were catching on as replacements for traditional user name and password authentication. "Catching on" may have been a bit optimistic.

De-commoditize a better mousetrap By now, you're probably well aware of the so-called "Halloween" memos. These are the two rather long documents purportedly prepared by Microsoft employees evaluating the risk factors of Linux vis-à-vis Microsoft's operating systems. Microsoft has acknowledged at least one of the memos as a valid internal document.

BioPassword learns how you type to provide security management In the mid-1990s, parents were eager to find software that would protect their children from the evils of the Internet. Well, they're still looking, aren't they? But one of the major applications in use was NetNanny, which claimed (and still does) to: "Stop Porn; Limit Time Spent Online; Stop Illegal File Sharing; and Protect Personal Info" (all in capitals, of course!).

Top 10 YouTube hacking videos Hacking for fun, profit and to meet women. These 10 YouTube hacker videos range from the humorous to the downright frightening. Some of them demonstrate live hacks, while others demonstrate the use of hacker tools.

FAQ: How to protect your PC against the Downadup worm Security experts say it's the biggest worm attack in years, call it "amazing" and report that it infected nearly 9 million PCs in just two weeks.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Radiant Logic
rule

Radiant Logic Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/21/09

Today's most-read stories:

  1. Where to watch Obama's inauguration online
  2. Bloggers give Obama marching orders
  3. Why HP is the 'Cisco of network mgmt. software'
  4. Cisco CTO could be tapped by Obama
  5. Obama's BlackBerry equals national security threat
  6. Microsoft layoffs could come next week
  7. U.S. plots major upgrade to Internet router security
  8. Mark Hopkins solves Vo-Fi challenge with smart antennas
  9. How Obama might get his way on BlackBerry
  10. Worm infects 1.1M Windows PCs in 24 hours


Comparing Troubleshooting Tools.
Better understand which network and application troubleshooting tools make the most sense for your IT shop. SNMP, NetFlow and packet analysis offer trending, network forensics, and server response time measurements. Learn the pros and cons of each and how they simply are not enough on their own.
Watch this webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: