So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in
debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.
Bennett Arron |
11 Jul |
Read more
Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.
Kevin Fogarty |
07 Aug |
Read more
The Australian Federal Police (AFP) claims to have struck a major blow to a multi-million identity fraud syndicate.
CIO Staff |
03 Jul |
Read more
Whether it is for an investigation, a whistle-blower statement, a prank or just extreme paranoia, you may have a need for anonymously sending messages. The following five tools provide an easy to use way to communicate incognito with Internet surfing, emails, phone calls and text messages. While these tools have their limitations, they do provide an Investigator a great way to hide his identity, gather intelligence, and communicate secretly when needed.
Brandon Gregg |
18 Jun |
Read more
Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.
Joan Goodchild |
08 Jun |
Read more
Facebook's Application Verification Program, controversial due to its concept of charging developers to have their applications certified as "trustworthy," has run into technical problems.
Juan Carlos Perez |
22 May |
Read more
Computer networks in the academic world are a lot like the Wild West: It's hard to tell the good guys from the bad, and the sheriff's ability to maintain order is severely limited.
Bill Brenner |
16 Sep |
Read more
The role management software vendor community is relatively young, and as such, Burton Group says there is no clear market leader. Vendors can be categorized into two segments: general purpose solutions and embedded solutions.
Mary Brandel |
09 Sep |
Read more
Role mining and discovery: The ability to collect user access and authorization information from a variety of resources, associate this data with candidate roles and responsibilities, propose alternative roles and leverage decisions made about the data on an ongoing basis.
Mary Brandel |
09 Sep |
Read more
If there is a Holy Grail in the information security industry, it surely is the answer to the question, "How secure is secure enough?"
Jaikumar Vijayan |
29 Jul |
Read more
Remember the old M&M analogy - security is like an M&M candy, hard shell on the outside, soft on the inside. In other words, put up firewalls, built a strong perimeter and you're good to go. Of course, nobody believes that M&M-type security is sufficient in today's world of insider threats, data leakage, mobile workers, thumb drives and sophisticated malware. So, what's the new metaphor? We asked around and came up with a number of interesting and useful ways to think about enterprise security.
Network World staff |
15 Jul |
Read more
Ah, youth. Ready to take on the world, today's generation of dynamic, tech-immersed youngsters have grown up alongside the Internet. Firsthand, and sometimes single-handedly, they have advanced some of today's hottest technology trends, from peer-to-peer networking, to massively multiplayer online games, to social networks and instant messaging. And along the way, a small, sociopathic number of them have behaved very, very badly.
Andrew Brandt |
06 May |
Read more
It's security's dirty little secret: Not having your users logged in as root or administrator will not stop malware.
Roger A. Grimes |
14 Jan |
Read more
Federated identity has long been a goal of many IT organizations. One look at the promise of federation, and it is easy to see why. After all, empowering one organization to serve as an identity provider for another frees IT from having to manage the identities of partnering organizations' employees and customers, thereby facilitating the pursuit of competitive-advantage projects. In this era of increasing enterprise decentralization, thanks in large part to the Web, establishing a federated identity framework is fast proving as essential as it is hard to pull off.
Phillip J. Windley |
04 Dec |
Read more
Faced with looming regulations such as the Health Insurance Portability and Accountability Act and the Sarbanes-Oxley Act, Craig Shumard, chief information security officer for healthcare provider Cigna, knew he needed better tools for role-based access control.
Denise Dubie |
04 Dec |
Read more
We've known for a long time that requiring just a user name and password to get on the network or to access personal information on a Web site isn't the tightest security posture, but there weren't a lot of good alternatives, and there wasn't that much pressure to change.
Neal Weinberg |
15 Jan |
Read more