Search This Blog

Monday, March 16, 2009

Authentication with a twist

Fujitsu has come up with a new non-intrusive system to read a biometric
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Live Webcast: Database Security.
Security and regulatory compliance are not optional despite slashed IT budgets. Join this Live Webcast sponsored by Oracle on Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Register for this Live Webcast now.

rule

Spotlight Story
Authentication with a twist

Dave Kearns By Dave Kearns
And now for something completely different. I promise nothing about provisioning and/or federation this week. In this issue, and the next, it's straight-forward, clear-cut authentication we'll discuss, but with a twist. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

The time may finally be right for biometrics I've been following biometrics and, specifically, fingerprint technology for a past 10-12 years. Each time I think it's about to take off, the sizzle turns to a fizzle once again. But now the time might be right. Not that biometrics are any more acceptable (even though they are), nor that the accuracy has improved (even though it has), but because the right application has come along.

Biometrics: 3 Tips for Success Biometric security systems can, at first glance, seem futuristic. In some minds, they are still the stuff of science fiction. Biometrics are often criticized as being expensive and not practical in many business ...

Biometrics make user authentication convenient and secure - at the same time! There’s usually an inverse relationship between enterprise security and end user convenience. When you tighten security, it often means more hoops for users to jump through – more complex passwords to remember, more sign-ons to endure, more tokens or cards to carry. That’s when you end up with passwords on Post-its, completely defeating your attempts at stronger security.

Using smart cards vs. passwords for identification A recent Datamonitor survey showed that 62% of enterprises have experienced problems relating to passwords being shared, borrowed or stolen from within their organizations. The survey of 200 enterprises also found that ...

Start-up measures users' trustworthiness for authentication into sites It never ceases to amaze me that as soon as I think some company is unique within a particular niche, another vendor comes along - sometimes three or four others - to occupy the same space. So it was that just after I submitted last week's newsletter about AdmitOne and its keystroke dynamics authentication method that I became aware of recent start-up Delfigo, which incorporates what it dubs "keyboard biometrics" into its multifactor authorization product.

Authentication factors Last issue I talked about the Blues Cruise and how it was a good real world illustration of identity issues. While on the cruise we stopped at Roadtown on Tortola in the British West Indies (BWI). And while there I stopped into Pusser's bar for a "painkiller" (worked real good!). And, oddly enough, it reminded me of an upcoming event that should interest you.

Validation, authorization: The next steps to identity management As someone pointed out to me last week, we're still spending an inordinate amount of time talking about authentication, and still trying to find a way to obviate the need for users to either memorize or write down lists of passwords and account names. Certainly that issue has come up in this newsletter a number of times over the past few weeks and months.

The last word on federated provisioning...for now I'd thought we'd probably had the last word on federated provisioning, but a couple of old friends (and regular readers) had some more information which they've allowed me to share with you.

Identity theft leads to murder Identity theft is getting truly nasty. In this case a woman who was apparently breaking into corporate accounts and stealing identities as well as dollars, was killed by three men who wanted her laptop and likely the cash stream the identity thefts were generating.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Oracle
rule

Live Webcast: Database Security.
Security and regulatory compliance are not optional despite slashed IT budgets. Join this Live Webcast sponsored by Oracle on Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Register for this Live Webcast now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/16/09

Today's most-read stories:

  1. 10 iPhone apps that could get you into trouble
  2. Cisco quietly downsizing through outsourcing
  3. Apple to unveil iPhone 3.0 OS update next week
  4. 15 free downloads to pep up your old PC
  5. FBI probe of Kundra's former D.C. technology officer may widen
  6. Rumors: Apple layoffs, 10-inch iPod Touch
  7. H-1B hiring too much of a hassle?
  8. Yusuf Acar busted by FBI as perp in federal bribery sting
  9. Microsoft, Intel to back Cisco's "Unified Computing" launch
  10. Conflicker.C variant set for April 1st surprise, CA says
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: