Blog Posts Tagged with "Digital Identity"
August 25, 2011 Added by:Jim Palazzolo
As individual's use certain resources such as cell phones or GPS devices, they leave behind information which is considered to be a part of their digital footprint. In this essay the writer conveys countermeasures that can be used to evade or reduce an individual's digital footprint...
August 24, 2011 Added by:Robert Siciliano
A true identity theft protection service monitors your identity by checking credit reports and scanning the Internet for your personal information. It looks out for your Social Security number, and if something goes wrong, has people who’ll work with you to resolve the problem...
June 20, 2011 Added by:Allan Pratt, MBA
When creating a Google Profile, you may be as comprehensive or as minimal as you wish. But, without a doubt, include your name, photo, gender, professional overview, and some links. Take control of your Google Profile – it actually feels empowering in this era of too little online control...
May 01, 2011 Added by:Keith Mendoza
The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...
April 02, 2011 Added by:Brent Huston
Companies and people don’t always do the right things and sometimes criminals win. They steal identity data and get the chance to commit massive fraud. We all know about it. We hear the stories and we hear people talking, but we don’t think it will happen to us, until it does. What now?
March 30, 2011 Added by:Robert Siciliano
Social media security issues involve identity theft, brand hijacking, privacy issues, online reputation management, and provides opportunities for criminals to “friend” their potential victims, creating a false sense of trust they can use against their victims through phishing or other scams...
February 28, 2011 Added by:Headlines
Problems surrounding the protection of a digital identity are not just a matter of concern for individuals, as businesses and private organizations are also subject to the threat of "identity theft" by criminal enterprises...
February 25, 2011 Added by:Robert Siciliano
February 23, 2011 Added by:Rafal Los
It’s a matter of balance. And right now the marketers and business leaders who see value in using personal information are much louder and more actively pursuing their exploitation of personal information than those who are trying to ensure privacy is addressed...
February 09, 2011 Added by:Rafal Los
Recently, I had the opportunity to exchange thoughts with Rebecca Herold, and talk about the erosion of privacy on the Internet, and specifically in social media. The topic is fascinating, as there appears to be an artificial adversarial relationship between anonymity and privacy...
February 08, 2011 Added by:Headlines
The researchers produced a tool that uses statistical analysis to calculate the relative uniqueness of any given username. The team can now distinguish a single user about half of the time by analyzing multiple usernames without using other key data such as location or date of birth...
February 04, 2011 Added by:Robert Siciliano
Parents who lack experience with the Internet, computers, or mobile phones must learn the basics before they can adequately monitor their children’s habits. A parent’s discomfort or unfamiliarity with technology is no excuse to let a child run wild on the Internet...
January 31, 2011 Added by:Christopher Burgess
Take a moment and review your digital exhaust. These are the nuclei of your biographic mass which will be compiled about you by any number of interested entities. I assure you, this information will not match your well articulated persona or the resume that you so painstakingly created...
January 27, 2011 Added by:Allan Pratt, MBA
It is critical to reserve your personal brand name and company name – and all other permutations you can think of – across all major social media sites. That way, you won’t have to worry about surprising news about your brand on a site that slightly resembles your official sites...
January 22, 2011 Added by:Theresa Payton
An early draft of the plan indicates that the implementation would be handled via the U.S. Commerce Department and not Department of Homeland Security or the National Security Agency. Experts feel this may be in a nod to privacy concerns...
January 08, 2011 Added by:Headlines
"We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities..."
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013
Starting to Clean Up the Mess from PCAnywher... Peggy Patterson on 06-18-2013