Identity & Access — News

Security 2011 show hits Sydney: Gallery

The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.

Neerav Bhatt | 25 Aug | Read more

The changing face of identity and location security

For two decades, the dominant security model has been location-centric. We instinctively trust insiders and distrust outsiders, so we build security to reflect that: a hard perimeter surrounding a soft inside. The model works best when there's only one connection to the outside, offering a natural choke point for firewall defense.

Andreas M. Antonopoulos | 15 Aug | Read more

Video ATMs offer human touch

Bank customers who still want to use a teller but are tired of queuing up at lunchtime will soon have a faster option if the big four banks decide to roll out NCR's APTRA video automatic teller machine (VTM).

Hamish Barwick | 15 Aug | Read more

Security rundown for week ending Aug. 12

Not unlike the <a href="http://www.networkworld.com/news/2011/080511-security-rundown.html">week before</a>, this past week saw hacking once again grab everyone's attention. This time it was <a href="http://www.networkworld.com/news/2011/081011-anonymous-allegedly-threatens-to-kill.html">an alleged threat</a> from the shadowy group <a href="http://www.itworld.com/security/192665/rumor-anonymous-trying-kill-facebook-fake">Anonymous</a> to "kill" the social-networking site Facebook. The reason given? Anonymous supposedly thinks Facebook abuses people's privacy and cooperates with authoritarian governments.

Ellen Messmer | 13 Aug | Read more

Black Hat: Apple does well but Microsoft does better with enterprise security

While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, <a href="http://www.networkworld.com/news/2011/080411-blackhat-overview.html?hpg1=bn">researchers at Black Hat</a>  say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.

Tim Greene | 08 Aug | Read more

Leverage government innovation to reduce identity management risks

Managing consumer or citizen identities comes with two key problems--scale and cost--prompting organizations that require onboarding, authentication, and <a href="http://www.csoonline.com/article/684895/password-management-systems-how-to-compare-and-use-them">password management</a> to look for ways to outsource this effort. Entertainment websites, online retailers, and even US federal government-to-citizen websites are experimenting with a federated model for more of their identity management life cycle. By using single sign-on (SSO) and attribute-sharing between "social" identity providers (IdPs) (i.e. Google and Facebook) and relying parties (RPs), this model effectively reduces cost and improves the customer experience.

Eve Maler | 14 Jul | Read more