Search This Blog

Thursday, September 24, 2009

FBI building system that blows away fingerprinting

FBI building system that blows away fingerprinting; How the Defense Department might institutionalize war-time biometrics
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Beyond Trust
rule

BeyondTrust PowerBroker: Root Access Risk Control for the Enterprise
Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. In this paper, EMA analysts examine BeyondTrust PowerBroker, a comprehensive solution designed to close these gaps for the enterprise with provable control.

Read More

rule

Spotlight Story
The IA Professional's Toolkit Part 6

As an information assurance (IA) consultant and as an in-house IA professional, you are a vendor to your client or your employer. How you handle vendors during a consulting project or in your day-to-day work can affect the success of your security project.  Read full story

Related News:

FBI building system that blows away fingerprinting
The FBI plans to migrate from its IAFIS fingerprint database to a new biometrics system that will include DNA records, 3-D facial imaging, palm prints and voice scans.

How the Defense Department might institutionalize war-time biometrics
The Defense Department is looking to turn its war-time biometrics experience into an enduring weapon at home and abroad.

Credit-card security standards questioned, survey says
Most IT security professionals who must comply with the industry standards to protect credit card data think those standards have no impact at all on actual security, according to new study by Ponemon Institute.

Microsoft to release identity product
My primary interest at last week's European version of The Experts Conference was Microsoft's upcoming Forefront Identity Manager 2010. If you haven't been following closely, you might know this soon to release product as Identity Lifecycle Manager (ILM) "2".

Startups see dollar signs in sex
Technology can help mitigate the new dangers presented by online dating and the "hook-up" culture of today's youth, as well as the long-present threat of sexual misconduct by trusted authority figures, according to three companies presenting at the DEMO conference on Tuesday.

Court to scammer: Give up your house or go to jail
Too many online scammers get away with what amounts to a wrist slap but a case if Las Vegas this week seems to be heading the right direction at least.   

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 24, 2009

MOST-READ STORIES

  1. Lotus goes after Microsoft's 'ridiculous and fabricated' figures
  2. A data breach with a twist
  3. Court to scammer: Give up your house or go to jail
  4. Microsoft declares war on 'scareware'
  5. 13 hot products from DEMOfall '09
  6. Machines could ultimately match human intelligence, says Intel CTO
  7. Cisco taps Microsoft exec to head collaboration
  8. Best smartphones for under $100
  9. FCC's net neutrality plan draws fast fire
  10. Microsoft urges users to disable vulnerable Win net protocol

Do More with Less Thru Netcool?
This white paper outlines methods to help service providers improve overall operational efficiency within the service assurance operational environment. Learn how IBM Tivoli® Netcool® solutions can help service providers streamline their operations, improve responsiveness and reduce costs.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: