Search This Blog

Wednesday, August 29, 2007

Lieberman lets administrators retrieve their own forgotten passwords

Email not displaying correctly? View it in your browser. | Unsubscribe

Identity Management: The world of identity, simplified Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Lieberman lets administrators retrieve their own forgotten passwords
Dave Kearns

By Dave Kearns
Not a month goes by it seems, without someone declaring the death of passwords as authentication devices. Everyone decries how easy it is to either guess or hack most passwords – or even coerce them from users as easily as offering a bit of candy in a trade. But suppose the user didn’t actually know what the password was – if they don’t know it, they can’t divulge it. And you can ensure that it’s as strong as necessary to prevent guessing and locked up tight enough to prevent hacking. Lieberman Software thinks it can do all of that. Read full story

Contact author Dave Kearns at identity@vquill.com


SPONSORED BY
rule

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.

rule
RELATED NEWS:

Are data breach lawsuits just tilting at windmills?, 08/25/07: For all the concern expressed about companies' exposure to lawsuits in the wake of of data breaches, a decision earlier this week by a federal appeals court shows yet again what a challenge it can be for consumers to actually win redress when one occurs.

The Monster.com mess, 08/24/07: The last thing you need when you're unemployed is a bank account that's suddenly emptied. But that's exactly what some unwary users of employment search site Monster.com faced after identity thieves made off with the personal information of more than a million people looking for jobs.

Poll: Risky e-business: Please take our poll where we pose questions, such as, has your identity been compromised by a bank, credit card company or retailer?


TODAY'S MOST-READ STORIES:

1. Airline puts Linux PC in every seat
2. How worried should you be about metal whiskers?
3. Deja vu: Sony uses rootkits, F-Secure says
4. Metal whiskers: a visual tour
5. How close is World War 3.0?
6. Acer to acquire Gateway for $710M
7. U.S. troops swap combat ideas on new site
8. Storm worm spam spoofs YouTube
9. Open-source companies to watch
10. Hot IT jobs: Systems administrator

MOST DOWNLOADED PODCAST:
Laptops designed for Linux: Matt Domsch

SPONSORED BY
rule

Secure Computing logoSafeWord Strong Two-Factor Authentication
Ensure proof-positive user identity for VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications. Provide unique, one-time pass codes for secure login that integrate seamlessly with Microsoft Active Directory. User self enrollment makes deployment & administration a breeze. And SafeWord tokens NEVER EXPIRE! Get a FREE evaluation kit today.

rule

IN THIS ISSUE:

08/29/07

Are data breach lawsuits just tilting at windmills?

The Monster.com mess

Poll: Risky e-business

Top news stories


cyber war abstract
WORLD WAR 3.0?
Inside the new reality of cyberwar.

ebay logo and picture of grilled cheese mary
EBAY ODDITIES
The 10 networkiest - and oddest - offerings on eBay.



Best practices for WAN Optimization
Join Mark Fabbi, Gartner Vice President and Distinguished Analyst, as he discusses the four critical actions you must take to meet your application acceleration goals. Also, learn how to choose the best WAN optimization solution for your needs, how to building a scalable architecture and more. Click here to learn more



IT Buyers guide

Security Buyer’s guide
From anti-spam to wireless LAN security, we've got detailed information on hundreds of products that will quickly help you pinpoint the hardware or software you're looking for.

 


To continue receiving Network World's Identity Management newsletter, please add @nwfnews.com to your white list.

PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: