Blog Posts Tagged with "Identity Management"

F29746c6cb299c1755e4087e6126a816

The Credit Score Ripple Effect on Your Identity

November 08, 2011 Added by:Kelly Colgan

The Wall Street Journal reports that “the proliferation of ‘scores’ highlights the widening trade in personal information, which is already fueling public concern about diminishing personal privacy...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

What to Do When You Get a Data Breach Letter

July 07, 2011 Added by:Kelly Colgan

A day doesn’t go by when we read news of a data breach at a major company, healthcare facility or financial institution. Epsilon, Sony and now Morgan Stanley, are a good examples. What do you do when a data breach notification letter lands in your mailbox? The short answer: Don’t panic...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

You Can't Fight Google, So Embrace Google

June 20, 2011 Added by:Allan Pratt, MBA

When creating a Google Profile, you may be as comprehensive or as minimal as you wish. But, without a doubt, include your name, photo, gender, professional overview, and some links. Take control of your Google Profile – it actually feels empowering in this era of too little online control...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

NSTIC: Questions I'd be Asking

May 01, 2011 Added by:Keith Mendoza

The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

College Suffers from Digital Identity Theft

February 28, 2011 Added by:Headlines

Problems surrounding the protection of a digital identity are not just a matter of concern for individuals, as businesses and private organizations are also subject to the threat of "identity theft" by criminal enterprises...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Your Name, Your Privacy, Your Digital Exhaust

January 31, 2011 Added by:Christopher Burgess

Take a moment and review your digital exhaust. These are the nuclei of your biographic mass which will be compiled about you by any number of interested entities. I assure you, this information will not match your well articulated persona or the resume that you so painstakingly created...

Comments  (1)

5c9886924588e138cc18290742c2095e

What Happened to My Biometric?

November 18, 2010 Added by:Guy Huntington

There has been a significant increase in the use of biometrics for authentication. It is becoming more commonly used to purchase groceries, to gain access to premises, passing through passport control and for logging on to computers. There are some dangers with this trend...

Comments  (1)

7af56c65866a442699d6dd1dfb02b528

Behavior Based Transaction Verification – More of the Same

November 17, 2010 Added by:Eli Talmor

Gartner continues to recommend fraud detection that monitors user behavior. This method captures and analyzes the user’s Web traffic, including login, navigation and transactions, and can spot abnormal access patterns that indicate an automated program is accessing the application..

Comments  (0)

5c9886924588e138cc18290742c2095e

Smart Grid Deployment and Identity Management

October 29, 2010 Added by:Guy Huntington

This paper outlines the challenges of deploying smart grid from an identity management and operational perspective. Legislation is forcing utilities to take on home or commercial generated power without thinking through the security, operations and identity implications...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Five Ways Identities Are Stolen Online

October 22, 2010 Added by:Robert Siciliano

Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of data breaches, and spent approximately $600 million repairing the damage. Based on these numbers, McAfee projects that companies lost more than a trillion dollars in the last year.

Comments  (1)

37d5f81e2277051bc17116221040d51c

Identity Theft – Common Consumer Errors

July 15, 2010 Added by:Robert Siciliano

People who have been victimized by identity theft often have a difficult time functioning as a result of their circumstance. Some deal with minor administrative annoyances whiles others suffer financial devastation and legal nightmares...

Comments  (1)

Ea3840c049893ef0051edf8bb6fa23f8

LifeLock and Billionaire John Menard

July 14, 2010 Added by:Roger M

Recently I heard a radio show advertising LifeLock which used a recent attempt to rob billionaire John Menard and his bank of $475,000 as an example of why you need LifeLock - a bad example...

Comments  (4)

A3e8b5e0becdbfb1b1c706b452b6c388

Road Map for an Application/Software Security Architect (Part 4)

December 15, 2009 Added by:Stephen Primost

Planning your application's use of the digital identity is not an after-thought of system architecture. At the least, it might offer the occasional lack of reliable and conflicting information. At the worst, it provides little, if no protection, at all. And like the proverbial little dutch boy, you will be putting fingers in the holes of the dike, attempting to shore up an weak infrastructure with...

Comments  (0)