The Wayback Machine - https://web.archive.org/web/20071008093455/http://www.insideid.com:80/


Inside ID
 The Source for Advanced Identity Management Solutions and Technology
Earthweb
Images Events Jobs Premium Services Media Kit Network Map E-mail Offers Vendor Solutions Webcasts
   subjects:
IT Management Webcasts:
Optimizing Change Management

Preparing for an IT Audit

More ITSM Webcasts


Search EarthWeb Network

internet.commerce
Be a Commerce Partner
Auto Insurance Quote
Mp3 Player Reviews
Home Improvement
Online Universities
Promotional Items
Shop
Contemporary Art
GPS Devices
Business Gifts Canada
Televisions
Computer Deals
Holiday Gift Ideas
Corporate Awards
Affiliate Programs

 eBook: The Mobile Explosion--This Isn't Your Father's Internet
Sponsored by Nokia
Every day, the Internet goes from being less of a luxury to more of a necessity for all of us. The worldwide growth of Internet usage combined with the nearly equal growth in mobile phone usage, more and more people will find the need to access the Internet through their mobile device. Learn how the mobile Web is evolving, the tips and tricks you'll need to go mobile, as well as the basics of what you need to get started on the mobile Internet. »
 
 eBook: Mobile Email and IM--A Strategic View
Sponsored by Nokia
This ebook examines the basics of what you need to know about workplace emails and instant messaging to help you understand what you're dealing with when you go mobile. It looks at the marketplace to show how mobile communications is poised to take off and discusses what you need to consider for implementing mobile email and IM in your enterprise. »
 
 How To: 7 Steps to Network Access Control
Sponsored by HP
Network access control helps ensure that only authorized users get access to the network. Furthermore, it ensures that users are granted access to only the network resources that they are authorized to use. Learn why it is essential that enterprises effectively administer network access depending on rights and needs.»
 
 Whitepaper: Secure File Transfer In the Era of Regulatory Compliance
Sponsored by Ipswitch
Increasing regulatory compliance mandates such as HIPAA, Sarbanes-Oxley, PCI DSS, BASEL II and J-SOX are compelling companies to establish a management strategy that includes the file transfer process. Learn how a Secure File Transfer approach can help companies meet the challenge of safely and reliably exchanging electronic business information. »
 

XML/RSS feeds

EarthWeb IT Management news and headlines
Inside ID headlines

See more EarthWeb Network RSS feeds

FREE Tech Newsletters

Special Reports
Identity and Homeland Security
Issues of identity are prominent in U.S. plans to stregthen security at the nation's border and transportation systems. Programs such as US-VISIT include databases and biometrics in an effort to verify the identity of individuals traveling to and within the United States.
[ more ]

eBook: The Admin's Guide to Server Infrastructure Tools. Learn why the question is not whether you need some of the tools, but which ones and from whom. Learn more. (PDF)

Report: TJX Security Was 'Inadequate'
By Stuart J. Johnston - Published September 27, 2007
Retailer faulted for collecting too much information, keeping it too long, and not upgrading security systems quickly enough. [more Inside ID]

IronPort OS Gets Encryption Update
By Sean Michael Kerner - Published September 21, 2007
New core operating system for IronPort's platforms adds encryption and better data-loss prevention technology to e-mail security. [more Inside ID]

Tiers of Trust To Offer IDs In a Crisis
By Sean Michael Kerner - Published September 13, 2007
When terror or natural disaster strikes, how do you make sure that the first responders are on the scene? [more Inside ID]

ID Purveyors to Meet with Deployers – Object: Single Sign-on
By Stuart J. Johnston - Published September 7, 2007
Tired of remembering a daunting list of passwords and user names for virtually everything you do? Several solutions are in the works. [more Inside ID]

Cybersecurity: Laws Only Go So Far
By Sonny Discini - Published September 6, 2007
U.S. Government is finally taking cybersecurity seriously in the form of new legislation but businesses shouldn't expect it to become a cure-all. [more Inside ID]

Bet You Don't Know Who I Really Am
By Clint Boulton - Published August 29, 2007
When it comes to the Internet, consumers' finances are cannon fodder for opportunistic thieves. [more Ecommerce]

Can Ask.com Capitalize On Next 'Gen of Search?
By David Needle - Published August 22, 2007
CEO of Ask.com says tapping the collective is key. Also: "Privacy is important and people want to know you aren't doing anything to harm them." [more Inside ID]

Report: Facebook Users Loose With The Info
By Nicholas Carlson - Published August 16, 2007
Sophos sting reveals 41 percent of Facebook users will divulge crucial identity data points to just about anybody. [more Inside ID]

From Russia With Larceny
By Andy Patrizio - Published August 7, 2007
Latest malware kit can integrate itself into your browser to mimic your online banking site, and you'd never notice the change. [more Inside ID]

DoJ Sends ID Theft Bill to Congress
Published July 23, 2007
Legislation builds on recommendations of the president's Identity Theft Task Force. [more Inside ID]

RFID Starts Making More Sense
By Jennifer Zaino - Published July 23, 2007
The technology is finding a home in industries beyond retail, but some still struggle with cost and whether RFID really is better than existing automatic identification systems. [more Inside ID]

Should the Feds Regulate RFID?
By P.G. Daly - Published July 23, 2007
Privacy pundits fear that RFID technology could infringe on our rights. [more Inside ID]

Oracle Fights ID Theft With 'Trust' in Bharosa
Published July 19, 2007
Software maker picks up partner Bharosa to flesh out its Identity Management software suite. [more Inside ID]

Many Breaches, Few ID Thefts
By Roy Mark - Published July 10, 2007
New government report analyzes 24 largest reported data breaches. [more Inside ID]

Thieves Verify Credit Cards Through Charities
By Tom Dunlap - Published July 9, 2007
Crooks are hacking from the rich to give to the poor in a pernicious scheme to test the validity of stolen credit cards. [more Inside ID]

Sneaky Web Apps to Get The Stealth Treatment
By Clint Boulton - Published June 24, 2007
Startup Palo Alto Networks proposes a new firewall for detecting sneaky Web 2.0 applications and threats. [more Inside ID]

Getting More Money to ID Theft Victims
By Roy Mark - Published June 21, 2007
FTC sends another 2,400 reimbursement forms to consumers victimized by ChoicePoint's 2004 data breach. [more Inside ID]

Who Are You? ID Purveyors to Collaborate
By Stuart J. Johnston - Published June 7, 2007
Microsoft, Liberty Alliance and OpenID to work together to achieve identity system interop. [more Inside ID]

Explorer, Firefox Take Heat
By Sean Michael Kerner - Published June 6, 2007
UPDATED: Security researchers claim a number of zero-day flaws in both Internet Explorer and Mozilla Firefox. [more Inside ID]

Vendors Buy in For Consumer, Corporate Protection
By Clint Boulton - Published June 5, 2007
EMC, McAfee and VeriSign demonstrate their commitment to IT security in time for the Gartner IT Security Summit. [more Inside ID]

Microsoft Aims for 'Identity Metasystem'
By Stuart J. Johnston - Published May 24, 2007
Company sponsors open source projects to help link the Web's identity infrastructure, makes ID specification free. [more Inside ID]

RFID Gunfight at the CeBIT Corral
By Drew Robb - Published May 21, 2007
Government, corporate interest in Radio Frequency Identification is heating up. [more Inside ID]

Leahy Raises REAL ID Act Revolt
Published May 11, 2007
Vermont senator says Congress should reconsider law that calls for national identification standards. [more Inside ID]

A 'Critical' Patch Day For Microsoft
By David Needle - Published May 9, 2007
Security vulnerabilities in Microsoft Office, Exchange, Internet Explorer and more are addressed. [more Inside ID]

Does IT Certification Matter Anymore?
Published May 11, 2007
The value of IT certification changes as technology changes, so it benefits tech workers to stay current with employers’ attitudes toward certs. [more Inside ID]

TSA Admits 100,000 Employee Records Missing
By Roy Mark - Published May 8, 2007
Agency can't account for hard drive containing payroll data. [more Inside ID]

Spammers Find New Ways Around Filters
By Andy Patrizio - Published May 2, 2007
Image-based spammers now use image hosting to get around image filters. [more Inside ID]

A New Fight Against ID Theft
By Roy Mark - Published April 24, 2007
A Bush task force recommends a package of new laws that comes with its naysayers. [more Inside ID]

Teens Are Protecting Themselves Online
By Nicholas Carlson - Published April 20, 2007
What, you thought the kids driving YouTube, MySpace, and Facebook wouldn't understand how to work privacy preferences? [more Inside ID]

The Secrets of Laptop Encryption
By Dr. Eric Cole - Published April 10, 2007
A leading security expert details the critical lessons that the industry has learned about using encryption. [more Inside ID]

Receive news via our XML/RSS feed
XMLRSS

See more EarthWeb Network feeds

Trial Software: Forefront Edge Security & Access Demo Toolkit. Get enhanced network edge protection & more.
On-demand Webcast: Beyond Basic Data Security
Webcast: The Role of Security in IT Service Management--Oct. 31, 2pm EDT.
Whitepaper: Learn How CIOs Can Drive Growth, Flexibility & Innovation in a Flex-Pon-Sive Company. Do you simply respond to change? Or drive it?
Stay up to date! Get real-time news and reviews about the latest innovations in internet technology.


IT MANAGEMENT NETWORK NEWS
Easing the Pain of Outsourcing
Report: TJX Security Was 'Inadequate'
A New Face for Live Search
MontaVista Upgrades Mobile Linux OS
SAP's On-Demand Strategy Draws Tepid Reviews
Salesforce.com Takes Wraps Off Force.com
MediaDefender Emails Show Insight into Media Industry Anti-Piracy Spending
eMusic Offers DRM-Free Audiobooks, While NBC Offers TV Shows Free for a Week
9/27: Mofei-X a Windows Worm
9/27: MSIL.Yakizake Worm Runs Within .NET or Mono Framework
ITIL Gains, But Not Without Pains
Should Anyone Care About ITIL?
Click here to see our latest articles
Report: TJX Security Was 'Inadequate'
IronPort OS Gets Encryption Update
DataSynapse Makes the Most of Virtual Environments
United Devices, Univa to Merge
Alignment: Hiring the Right CIO
The Telecommuting Myth
ITIL Gains, But Not Without Pains
Oracle Sees Semantic Tech Solving Business Problems

Solutions


JupiterOnlineMedia

internet.comearthweb.comDevx.commediabistro.comGraphics.com

Search:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info