Wednesday, February 11, 2009

Authentication factors

Highlights to the upcoming European Identity Conference
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Radiant Logic
rule

Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Spotlight Story
Authentication factors

Dave Kearns By Dave Kearns
Last issue I talked about the Blues Cruise and how it was a good real world illustration of identity issues. While on the cruise we stopped at Roadtown on Tortola in the British West Indies (BWI). And while there I stopped into Pusser's bar for a "painkiller" (worked real good!). And, oddly enough, it reminded me of an upcoming event that should interest you. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Your Identity: 'Costanza Style' Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.

Largest coordinated ATM rip-off ever nets $9+ million in 30 minutes And Cisco Subnet blogger Jamey Heary explains how they did it.

Public Greets Massive Data Breach With Collective Yawn On January 20, as most of the nation focused on an historic inauguration, Heartland Payment Systems, a credit card payment processing company, acknowledged that data thieves had installed spyware on its network to steal credit card details throughout 2008. The company says it handles about 100 million payments a month, and doesn't yet know how much information was stolen; the theft might be the biggest data breach ever.

Putting Context in Identity I had a wonderful time at last week's 2nd annual European Identity Conference in Munich. Martin Kuppinger and his crew at Kuppinger Cole + Partner for putting on an excellent conference, one which I highly recommend you add to your calendar for next year. I'd also like to thank the great guys who put themselves in harm's way (well, harm to their reputations) by participating in the three hour long panel sessions I moderated on the general topic of "Putting Context in Identity."

A 'real world' look at the facets of identity I just got back from a 7-day music festival - an excellent opportunity to further investigate pseudonyms, personas and roles. It was, by far, the most entertaining vacation I've taken in many years but it was also very enlightening as a "real world" look at these facets of identity.

Is a pseudonym the same as a persona? We were recently having one of our interminable discussions on the Identity Gang mailing list (this was the privacy vs. anonymity discussion which dates back, oh, dozens of years) when Oracle's Nishant Kaushik - identity architect at Oracle and author of the Talking Identity blog - raised an interesting question: "Isn't a pseudonym the same as a persona [as defined in the identity management world, by my understanding]?" Well, there's nothing I like better than chewing over the meaning of words - so I did.

Different facets of a single identity I was contemplating the Christmas season and what it means to those of a religious bent when it occurred to me that the idea of "persona" - different facets of a single identity - is thousands of years older than our digital world.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

Don't be a data loss victim Somebody was siphoning customer financial data from a chain of gas station/convenience stores.
Plus: 7 ways to stop data breaches The experts all say that data security goes beyond the use of technology. Nevertheless, there are numerous tools and techniques that IT professionals can use to improve their organization's stance on data security.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Radiant Logic
rule

Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/11/09

Today's most-read stories:

  1. Google adds ActiveSync to accommodate iPhone, Win Mobile
  2. A few clean words from the creator of Cursebird
  3. Kaspersky says Web hack 'should not have happened'
  4. Evolution of the router
  5. FTC kills fraudulent online check-processing operation
  6. Microsoft rounds out voice assault
  7. Microsoft goofs, unveils new Web-based smartphone sync service
  8. Nortel to shed shareholders meeting, more employees
  9. Don't wait for my phone: Google Sync, others here now
  10. Mommas don't let their babies grow up to be engineers


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment