Monday, January 14, 2008

2008 is going to be a good year for identity management-based collaboration

Security: Identity Management Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
2008 is going to be a good year for identity management-based collaboration

Dave Kearns By Dave Kearns
Responses to "prediction" newsletters usually come in hard and fast, and last week's predictions newsletter was no exception. I'll be talking about some of those reactions over the coming weeks but today I want to concentrate on one particular area: the convergence of federation, role-management and provisioning - along with entitlement management - to produce real tools for collaboration. Read full story

Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here

MORE STORIESARROW


SPONSORED BY SILVER PEAK
rule

Best Practices for WAN Optimization with Data Replication
Learn the keys for successful data protection across the WAN in this informative whitepaper, Best Practices for Deploying WAN Optimization with Data Replication. Get tips on how to configure these platforms and how to optimize your deployment.

rule
RELATED NEWS:

Podcast: Top Identity Management trends for 2008 As part of our Prediction Week of podcasts, we talk with David Ting from Imprivata about the top identity management predictions and issues for the year. Learn about the swing back to thin-client computing (through virtualization), whether enterprises are truly ready for biometrics, and why the insider threat will be even more important in 2008.

Citibank antifraud move draws cashflow conspiracy chatter, 01/10/08 A Citibank spokesman Wednesday dismissed outright suggestions in the blogosphere that a recent decision by the company to quietly reduce the daily ATM cash withdrawal limits of some of its customers had something to do with Citibank's cash-reserve position.

Colombian man pleads guilty to computer fraud, 01/10/08 A Colombian man pleaded guilty Wednesday to a 16-county indictment involving an identity theft scheme in which he installed keylogging software on hotel business center computers and Internet lounges in order to steal passwords, account data and other personal information, the U.S. Department of Justice announced.

Storm splinters, starts phishing, say researchers, 01/10/08 Part of the Storm botnet appears to have been rented out to identity thieves, who are using it to conduct traditional phishing attacks that target customers of a pair of U.K.-based banks, researchers said Wednesday.

Wisconsin state agency mailing exposes data on 260,000, 01/09/08 "Appalled" officials at the Wisconsin State Department of Health and Family Services (DHFS) are asking Electronic Data Systems to explain why it allowed Social Security numbers to be printed on the address labels of information brochures recently sent to more than 260,000 recipients of state health care services.

Passport card with chatty RFID chip draws privacy ire, 01/09/08 A proposed new RFID-enabled passport card intended for use by Americans frequently travelling to Canada, Mexico. Bermuda and the Caribbean poses serious security and privacy risks for users, the Centers for Democracy and Technology (CDT) warned this week.

Yahoo tests support for OpenID, 01/09/08 Yahoo appears close to implementing OpenID, a Web authentication standard that relieves people of the need to remember multiple passwords to log into different Web sites.


IT DEPARTMENT DEAD?
Nicholas Carr IT gadfly Nick Carr's new book stirs lively debate about utility computing.

CES HIGHLIGHTS
CES International 2008 Take a look at what was hot from the 2008 International Consumer Electronics Show.

SPONSORED BY SILVER PEAK
rule

Best Practices for WAN Optimization with Data Replication
Learn the keys for successful data protection across the WAN in this informative whitepaper, Best Practices for Deploying WAN Optimization with Data Replication. Get tips on how to configure these platforms and how to optimize your deployment.

rule

Featured Webcast for Newsletter Subscribers
Improve App Performance with Web Acceleration. Find out how to improve the delivery of Web applications to geographically dispersed users with Web acceleration tools. Learn how to shop for these products and find out what the best and worst applications are. http://www.accelacomm.com/jlp/PSA2_80162151/7/80162151/

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/14/08

TODAY'S MOST-READ STORIES:

  1. Young IT workers disillusioned
  2. Torvalds breaks down Linux
  3. IT department's death exaggerated
  4. The 15 best downloads of the year
  5. Apple iPhone doomed to failure
  6. Top new gadgets from CES 2008
  7. Whose bandwidth is being given away?
  8. Facebook 'Secret Crush' not our fault
  9. How Microsoft is going green
  10. Cisco loses to Riverbed in WAN optimization

FEATURED BUYER'S GUIDE:
Client Management


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Identity Management Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2008

 

 



No comments:

Post a Comment