Monday, September 28, 2009

Notes from Digital ID World

Wireshark Errors - Or Are They?; Futuristic security surveillance system brings Big Brother to life
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Strangers (or Customers) Share Their Experience with IBM Service Management
IBM Service Management provides smarter solutions to design, build and manage a dynamic infrastructure that enables you to improve service, reduce cost and manage risk, while managing and delivering business and IT services more efficiently and effectively. But don't take it from us. See what others say. Watch the Service Management videos.

Click to continue

rule

Spotlight Story
Notes from Digital ID World

While I was in Germany for The Experts Conference, Digital ID World (DIDW) was taking place in Las Vegas. Since I couldn't be in two places at once, I have to rely on others to tell us what the high (and low) points of the conference were. Today we'll hear from my fellow grandfather, Mark Dixon (he's Chief Identity Solution Architect in Sun's North American Software Practice), who is a veteran DIDW attendee. Read full story

Related News:

Wireshark Errors - Or Are They?
One of the features of Wireshark that you may have noticed, if you've been reading my posts this week and doing some experimenting on your own, is that the program color-codes packets in the packet list pane. For example, if Wireshark detects potential problems, it colors them with red text on a black field. Don't be too concerned if you see some packets that appear this way – it might indicate...

Futuristic security surveillance system brings Big Brother to life
Researchers are looking to develop an intelligent image system that can monitor large areas, perhaps miles wide, identify potential threats based on the correlation of events and anomalies it detects, and issue timely alerts with few false alarms.

Social networking sites leaking personal information to third parties, study warns
Many major social networking sites are leaking information that allows third party advertising and tracking companies to associate the Web browsing habits of users with a specific person, researchers warn.

A chat with the head of Piryx, democracy's PayPal
Piryx is trying to become a one-stop shop for non-profits and politicians who are looking to raise serious cash for their causes.

Fingerprints not enough for future security government systems
The FBI and Department of Defense are undergoing massive security-system makeovers that will make more extensive use of DNA, facial recognition, iris scans and palm over the traditional fingerprints for security investigations.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More


Beefing up Email Security by Teaming with a Leader
Improve your email security practices after watching this Live Webcast on Wednesday, September, 30 at 1:00 p.m. ET/10:00 a.m. PT. Your email security choices extend beyond on-premise only solutions. Improve your anti-spam, visibility, content filtering and encryption support with hosted, hybrid and managed email security services.
Click here to register.

 

September 28, 2009

MOST-READ STORIES

  1. Microsoft "Courier" Tablet to compete against Apple Tablet
  2. Microsoft, researchers release new operating system project
  3. IE8 runs 10 times faster with Google plug-in
  4. Microsoft blasts Google over Chrome Frame plug-in
  5. Chambers' pay package climbs 16% while Cisco net income falls 23%
  6. How could iPhone MMS crash AT&T's network?
  7. MMS to go live on the iPhone tomorrow
  8. What to do about bandwidth hogs?
  9. FBI building system that blows away fingerprinting
  10. Seven advanced car technologies the government wants now

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment