Search This Blog

Wednesday, March 18, 2009

The first trust infrastructure for mashups

SafeMashups launches MashSSL, the first trust infrastructure for mashups
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Reducing Web Threats on your Net.
Ensure security, regulatory compliance, and business continuity with a new approach to security explained in this whitepaper, "Web Threats: Challenges and solutions." Effectively defend your network against the latest web threats with technology and services at a variety of levels for full protection. Get all of the details today.

rule

Spotlight Story
The first trust infrastructure for mashups

Dave Kearns By Dave Kearns
It's been a long time since I talked about the identity of anything except people, but we should remember that everything on our networks has an identity - the devices, the services, the applications - even the data packets. I was reminded of this last week when I caught up with Ravi Ganesan, formerly CEO of TriCypher and now a Research Professor at the University of Texas San Antonio (UTSA), and CEO of SafeMashups. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Two start-ups, Egress and SafeMashups, make debut today Two start-ups, Egress Software Technologies and SafeMashups, each make their debut today with security products that have a crypto-tech edge to make data flowing across the Internet safer.

Start-up UnboundID unveils directory for Web 2.0 Directory start-up UnboundID slipped out of stealth mode Tuesday and introduced a scalable and high performance standards-based platform aimed at handling the identity and personalization demands of Web-based services and mobile computing.

Seven strong authentication methods As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of online security. These seven methods are those most often encountered in a financial services environment, but they would be useful (and adaptable) to just about any area where stronger authentication was needed.

Safe job searching Are you on the lookout for IT work? If so, beware of identity thieves who are seizing upon the bad economy to scam job seekers, warns the Identity Theft Resource Center. The organization offers advice for online job searching.

New Institute for Cyber Security advances research, development of security technologies In a campus computer science lab, students are doing research and development on advanced cybersecurity technologies. Professors and technical advisors are helping to commercialize the results of the R&D, intent on creating viable digital security products. Experienced business leaders are nurturing the budding companies that will bring the new solutions to market. Venture capitalists and angel investors are sniffing around for their next big opportunity. And the state government and the U.S. Department of Defense are solidly behind the efforts to make this new incubator, and the Institute for Cyber Security (ICS) as a whole, successful.

Japan Post Bank fights online fraud Japan Post Bank has deployed the RSA's FraudAction service to protect its customers and assets from online crime and phishing attacks.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Trend Micro
rule

Reducing Web Threats on your Net.
Ensure security, regulatory compliance, and business continuity with a new approach to security explained in this whitepaper, "Web Threats: Challenges and solutions." Effectively defend your network against the latest web threats with technology and services at a variety of levels for full protection. Get all of the details today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/18/09

Today's most-read stories:

  1. A 10-piece sampler from Microsoft's patent pipeline
  2. Cisco busts out beyond blade servers with Unified Computing System
  3. Cisco says it considered HP, IBM for blade server
  4. Kraken the botnet: The ethics of counter-hacking
  5. Sony resists PlayStation 3 price cut
  6. Could Cisco and BMC become more than partners?
  7. 10 iPhone apps that could get you into trouble
  8. Cisco as underdog
  9. Spam delivers fake news of bomb blast as lure to malicious code
  10. Computer science major is cool again
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: