Monday, February 02, 2009

Snacking on the Active Directory Cookbook; the Directory Expert Conference targets a bigger crowd

Useful resources for Active Directory managers
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Radiant Logic
rule

Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Spotlight Story
Snacking on the Active Directory Cookbook; the Directory Expert Conference targets a bigger crowd

Dave Kearns By Dave Kearns
Today's newsletter is all about Active Directory with news of a new book, a Webcast and a live event all of which can inform, educate and entertain you. Now those of you who have been reading this newsletter for a long time know that I've never considered AD the best directory system. I still don't. But, in marketing terms, AD could be called the World's Favorite Directory because there are certainly more AD "seats" than for any other system. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Searching for the digital needle in a relational hackstack Let me share a few of the tools I use to help customers identify their possible exposure to information theft.

Industry giants to weigh in on U.S. privacy laws A group of U.S. companies, led by technology giants Microsoft, HP and eBay, is set to outline recommendations for new federal data-privacy legislation that could make life easier for consumers and lead to a standard federal breach-notification law.

What the Web knows about you She had me at hello ... or just about. Our conversation had barely started when privacy activist Betty Ostergren interrupted me to say that she had found my full name, address, Social Security number and a digital image of my signature on the Web.

With economic slump, concerns rise over data theft Is the worsening economic situation going to turn some employees into data thieves?
Related podcasts:
5 Ways Employees Can Sabotage Your Network
Protecting against insider threats in a down economy
Who's Stealing Your Data?

Data export leaves firms vulnerable, says research The tendency of firms to distribute sensitive data to offices around the globe could be creating a new form of information vulnerability, a report has suggested.

VA to pay $20M to settle data theft case The Department of Veterans Affairs has agreed to pay $20 million to military personnel to settle one of the government's most high profile and embarrassing data theft cases. The VA data theft in 2006, involved the theft of a laptop from an employee's home that contained the unencrypted personal records of 26.5 million military veterans and their spouses. The breech lead to several new laws concerning how the government and public companies are to treat such breeches. The laptop was ultimately recovered and the VA maintains that no personal data was ever compromised.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Radiant Logic
rule

Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

02/02/09

Today's most-read stories:

  1. Ex-Fannie Mae employee accused of planting computer time bomb
  2. Fan starts campaign for Windows 7's immediate release
  3. Windows 7 will not sway XP users
  4. Google M-Lab provides a window into your ISP
  5. Don't fear the penguin: A newbie's guide to Linux
  6. 10 woeful tales of data gone missing
  7. IPhone takes 1.1% of the mobile phone market
  8. Worm floats Obama's head on your desktop
  9. Taser-wielding boss? Can't get to me here
  10. Are these the real reasons for the fall of Nortel?


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment