Wednesday, January 02, 2008

Not giving a hoot about 'user centric'

Security: Identity Management Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Not giving a hoot about 'user centric'

Dave Kearns By Dave Kearns
I trust everyone made it through the holiday season reasonably well. Now it's time to get to the "prediction season," when all the pundits try to fashion a prognostication that's a little over the top but still has a chance of occurring. I'll get to my predictions next week, right now I'd like to offer one from my friend at Digital ID World, Eric Norlin, who believes that in 2008 "'user-centric' identity protocols will stop calling themselves 'user-centric'." Read full story

Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here

MORE STORIESARROW


SPONSORED BY QUALYS
rule

Learn how to Better Secure Your Network
Discover how to quickly repair vulnerabilities, reduce the number of false positives and negatives and reduce your total cost of ownership when it comes to network security. Click here to read this whitepaper now.

rule
RELATED NEWS:

IBM upgrades identity management, focusing on user access and compliance, 12/12/07 IBM upgraded its identity management capabilities with tools to help customers manage user access to sensitive information, the company said Wednesday.

Minnesota CIO wants government IT to be more innovative, less risk-averse, 12/22/07 Minnesota CIO Gopal Khanna says the state’s IT priorities including e-government services; consolidation of data centers and utility services such as storage, collaboration and content management systems; and security initiatives such as ...

Privacy, data breaches still run rampant, shows survey of IT pros, 12/17/07 Privacy incidents involving mishandled personally identifiable information are rampant in organizations, according to a survey of 827 security and privacy professionals in North America.


EVERYTHING THAT MATTERS
Clear Choice Test Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY QUALYS
rule

Learn how to Better Secure Your Network
Discover how to quickly repair vulnerabilities, reduce the number of false positives and negatives and reduce your total cost of ownership when it comes to network security. Click here to read this whitepaper now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/02/08

TODAY'S MOST-READ STORIES:

  1. Top 25 iPhonies
  2. Microsoft pulls plug on potty-mouth Santa
  3. 12 IT skills that employers can't say no to
  4. Top 15 USB geek gadgets
  5. 20 great Firefox extensions
  6. 10 network-iest movies of all time
  7. Honoring weird science at Harvard
  8. 15 all-time network-iest TV characters
  9. Networking's 50 greatest arguments
  10. Behind the scenes of MIT's network


TOP 100 OF 2007


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Identity Management Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment