Blog Posts Tagged with "Identity Management"
November 08, 2011 Added by:Kelly Colgan
The Wall Street Journal reports that “the proliferation of ‘scores’ highlights the widening trade in personal information, which is already fueling public concern about diminishing personal privacy...
July 07, 2011 Added by:Kelly Colgan
A day doesn’t go by when we read news of a data breach at a major company, healthcare facility or financial institution. Epsilon, Sony and now Morgan Stanley, are a good examples. What do you do when a data breach notification letter lands in your mailbox? The short answer: Don’t panic...
June 20, 2011 Added by:Allan Pratt, MBA
When creating a Google Profile, you may be as comprehensive or as minimal as you wish. But, without a doubt, include your name, photo, gender, professional overview, and some links. Take control of your Google Profile – it actually feels empowering in this era of too little online control...
May 01, 2011 Added by:Keith Mendoza
The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...
February 28, 2011 Added by:Headlines
Problems surrounding the protection of a digital identity are not just a matter of concern for individuals, as businesses and private organizations are also subject to the threat of "identity theft" by criminal enterprises...
January 31, 2011 Added by:Christopher Burgess
Take a moment and review your digital exhaust. These are the nuclei of your biographic mass which will be compiled about you by any number of interested entities. I assure you, this information will not match your well articulated persona or the resume that you so painstakingly created...
November 18, 2010 Added by:Guy Huntington
There has been a significant increase in the use of biometrics for authentication. It is becoming more commonly used to purchase groceries, to gain access to premises, passing through passport control and for logging on to computers. There are some dangers with this trend...
November 17, 2010 Added by:Eli Talmor
Gartner continues to recommend fraud detection that monitors user behavior. This method captures and analyzes the user’s Web traffic, including login, navigation and transactions, and can spot abnormal access patterns that indicate an automated program is accessing the application..
October 29, 2010 Added by:Guy Huntington
This paper outlines the challenges of deploying smart grid from an identity management and operational perspective. Legislation is forcing utilities to take on home or commercial generated power without thinking through the security, operations and identity implications...
October 22, 2010 Added by:Robert Siciliano
Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of data breaches, and spent approximately $600 million repairing the damage. Based on these numbers, McAfee projects that companies lost more than a trillion dollars in the last year.
July 15, 2010 Added by:Robert Siciliano
People who have been victimized by identity theft often have a difficult time functioning as a result of their circumstance. Some deal with minor administrative annoyances whiles others suffer financial devastation and legal nightmares...
December 15, 2009 Added by:Stephen Primost
Planning your application's use of the digital identity is not an after-thought of system architecture. At the least, it might offer the occasional lack of reliable and conflicting information. At the worst, it provides little, if no protection, at all. And like the proverbial little dutch boy, you will be putting fingers in the holes of the dike, attempting to shore up an weak infrastructure with...
Why You Shouldn’t Use the OWASP Top 10 as ... abdul bari Chanessra on 01-29-2015
Infographic: Keeping Web Applications Safe... Cavdgadf Vdvndsf on 01-29-2015
Wireless Home Technologies Create Security R... Cavdgadf Vdvndsf on 01-29-2015