Search This Blog

Monday, August 27, 2007

Graphing your online identity

Email not displaying correctly? View it in your browser. | Unsubscribe

Identity Management: The world of identity, simplified Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Graphing your online identity
Dave Kearns

By Dave Kearns
August is a slow month, so it doesn’t take much to get a buzz rolling. And the buzz was rolling last week after Brad Fitzpatrick, creator of LiveJournal and co-inventor of OpenID, and David Recordon, VeriSign - and OpenID – evangelist, issued what’s being called a “manifesto” to the social networking community. What’s it about? It boils down to identity portability. Read full story

Contact author Dave Kearns at identity@vquill.com


SPONSORED BY
rule

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.

rule
RELATED NEWS:

Monster shuts down rogue server after breach, 08/23/07: Monster Worldwide, whose job-hunting sites suffered a massive data breach caused by hackers, has shut down a rogue server that had been used to gather personal details of job seekers.

First California, now New York City lets pensioner info slip, 08/23/07: The past few days have turned out to be a tad unlucky for some retirees.

U.S. state pension fund admits breach of retiree data, 08/22/07: Red-faced officials at the California Public Employees' Retirement System (CalPERS) are sending out letters of apology to about 445,000 state retirees after inadvertently printing their Social Security numbers on brochures announcing an upcoming election at the state pension fund.

Study: Facebook users are easy targets for identity theft, 08/14/07: Users of the Facebook social-networking site are too gullible in giving up personal information, which could make them the targets of identity theft, according to Sophos research.

Poll: Risky e-business: Please take our poll where we pose questions, such as, has your identity been compromised by a bank, credit card company or retailer?


TODAY'S MOST-READ STORIES:

1. How close is World War 3.0?
2. Gunplay blamed for Internet slowdown
3. Storm worm spam nearly doubles in volume
4. Deploying Google Apps: A career-killer?
5. Microsoft-Cisco collaborative lovefest over?
6. 10 virtualization companies to watch
7. 1.6M records stolen from Monster.com
8. 5 things Estonia did right in battling hacktivism
9. 3G wireless not just for big shots anymore
10. Singapore Airlines puts a Linux PC in every seat

MOST DOWNLOADED PODCAST:
Safety tip: Keep your cell phone out of your pocket

SPONSORED BY
rule

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.

rule

IN THIS ISSUE:

08/27/07

Monster shuts down rogue server after breach

First California, now New York City lets pensioner info slip

U.S. state pension fund admits breach of retiree data

Study: Facebook users are easy targets for identity theft

Poll: Risky e-business

Top news stories


cyber war abstract
WORLD WAR 3.0?
Inside the new reality of cyberwar.

ebay logo and picture of grilled cheese mary
EBAY ODDITIES
The 10 networkiest - and oddest - offerings on eBay.



Best practices for WAN Optimization
Join Mark Fabbi, Gartner Vice President and Distinguished Analyst, as he discusses the four critical actions you must take to meet your application acceleration goals. Also, learn how to choose the best WAN optimization solution for your needs, how to building a scalable architecture and more. Click here to learn more



IT Buyers guide

Security Buyer’s guide
From anti-spam to wireless LAN security, we've got detailed information on hundreds of products that will quickly help you pinpoint the hardware or software you're looking for.

 


To continue receiving Network World's Identity Management newsletter, please add @nwfnews.com to your white list.

PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: