Search This Blog

Wednesday, September 09, 2009

Voice biometrics haven't caught on just yet

The shine is off directories 10 years later ; The history of steganography
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Quest Software
rule

Quest's Free Virtual Event: Oct 21-22
Get the identity and access management information you need – without leaving your keyboard! At Quest Connect, you'll interact and learn, virtually. Topics include making single sign-on work in the real world and becoming friends with your identity and access management framework. Best of all, registration is free. Sign up today.

Click to continue

rule

Spotlight Story
Voice biometrics haven't caught on just yet

I had a note last week from PR dynamo Melissa Hyland talking about new voice biometrics solutions from Nuance Communications. Since I hadn't covered the company before, I looked up their management and advisers to see if there were any "old friends" – and I found one. Read full story

Related News:

The shine is off directories 10 years later
Ten years ago this week we launched the newsletter which, over time, became the one you're reading today. But back in September of 1999, "identity management" wasn't a phrase known to many people. So what Network World launched was called "Fusion Focus on Directory Services."

The history of steganography
There is a wealth of methods for creating encrypted messages you can¿t even tell are there

Military spends $10M to build Web sites aimed at squelching anti-US messages
Can a series of customized Web sites written in specific, strategic foreign languages actually influence how the world perceives our government's policies? And by-the-way help fight the war on terror? Sounds like a stretch but that is indeed the goal of the project known as the Trans Regional Web Initiative. 

Privacy watchdogs, authors urge judge to reject Google Book Search settlement
A group of prominent authors and privacy advocates, including the ACLU and Electronic Frontier Foundation, is urging a New York judge this morning to reject a proposed deal that would grant Google access to and control over millions of digitized books.

Beware the evil lurking behind California wildfire
Capitalizing on popular search terms like "California wildfires" is one strategy hackers are using to direct people to fraudulent Web sites, said a security expert with Symantec Corp.

Microsoft: Patching Windows 2000 'infeasible'
Microsoft took the unusual step today and skipped patching one of the vulnerabilities addressed in its monthly security update, an omission that leaves users running Windows 2000 Server Service Pack 4 vulnerable to attack.

Microsoft Patches Critical MP3 Flaw
Today's Patch Tuesday fixes from Microsoft include six critical bulletins that head off potential attacks involving poisoned media files and Web pages, along with wireless and TCP/IP security holes. An under-attack FTP flaw remains unfixed.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now


Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now

 

September 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. 12 words you can never say in the office
  2. Developer denies software to beat Chinese censors is malicious
  3. Encryption made easier with new key management tools
  4. How to make yourself layoff-proof
  5. Can you see John Chambers directing Cisco to buy Alcatel-Lucent?
  6. Wi-Fi encryption cracked in 60 seconds
  7. Fast, universal broadband: dirty secret about Roadblock
  8. IPhone passcode bugs revealed
  9. BBN, Raytheon and a fresh JFK conspiracy theory
  10. Dirty vendor secrets

Thinking Beyond Tape: The Case Against Tape Backup
Many companies are already backing up their main and branch office systems to tape, but what they don't understand is just how vulnerable their data and their business remains. This video whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: