Search This Blog

Monday, February 09, 2009

A 'real world' look at the facets of identity

Investigating pseudonyms, personas and roles at a music festival
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Akamai Technologies
rule

Fulfill Your Remote Access Strategy for Mobile Users
Transform the Internet into a business-ready application delivery platform and achieve a successful remote access strategy. Download this Frost & Sullivan report today:

rule

Spotlight Story
A 'real world' look at the facets of identity

Dave Kearns By Dave Kearns
I just got back from a 7-day music festival - an excellent opportunity to further investigate pseudonyms, personas and roles. It was, by far, the most entertaining vacation I've taken in many years but it was also very enlightening as a "real world" look at these facets of identity. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

DeVault Helps Protect Against Identity Theft If you need to protect personal and sensitive documents from prying eyes, you'll find deVault 2009 an excellent, free solution. It uses Blowfish 256-bit encryption to keep your documents private, and offers plenty of features for encrypting, decrypting, and managing your documents.

Identity thieves beat Obama to stimulus package punch Although the U.S. government's economic stimulus package hasn't even gotten out of Congress, scammers aren't waiting; they've launched multiple campaigns that tempt users into revealing personal information, a security researcher warned Thursday.

Is a pseudonym the same as a persona? We were recently having one of our interminable discussions on the Identity Gang mailing list (this was the privacy vs. anonymity discussion which dates back, oh, dozens of years) when Oracle's Nishant Kaushik - identity architect at Oracle and author of the Talking Identity blog - raised an interesting question: "Isn't a pseudonym the same as a persona [as defined in the identity management world, by my understanding]?" Well, there's nothing I like better than chewing over the meaning of words - so I did.

Different facets of a single identity I was contemplating the Christmas season and what it means to those of a religious bent when it occurred to me that the idea of "persona" - different facets of a single identity - is thousands of years older than our digital world.

Learn how Web sites collect private info on you (and your kids) In honor of Data Privacy Day, Cisco launched a Website, whitepaper and Facebook page which teaches consumers the hows and whys of Website data collection, reports blogger Jamey Heary.

Do more with less...staff Speaking of Quest, as I was in the last issue, my friend Quest Senior Director, Product Management Jackson Shaw recently blogged about his predictions for 2009. One, in particular, resonated with me: "Do more with less (employees, consultants, temporary staff)."

AccessStream releases open source identity access management package As the new year came in, a new project was revealed to the public: an open source identity access management package from AccessStream. The package was released as a Beta 1 version but AccessStream said it should be treated as alpha code. A second release is imminent, though, so maybe it's time you took a look.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Akamai Technologies
rule

Fulfill Your Remote Access Strategy for Mobile Users
Transform the Internet into a business-ready application delivery platform and achieve a successful remote access strategy. Download this Frost & Sullivan report today:

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/09/09

Today's most-read stories:

  1. Apple planning TV with iTunes integration and DVR capability?
  2. Violent video games can help with fire safety
  3. Microsoft rounds out voice assault
  4. MySQL co-founder quits Sun
  5. Porn site feud spawns new DNS attack
  6. Up to 2,000 jobs to be cut at Cisco?
  7. Nortel still signing up customers
  8. Sprint's 4G guy: Todd Rowley on the need for speed
  9. 9 cool geek tips I just can't function without
  10. Researchers: IT security jobs largely untouched by economy


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: