Posts Tagged: identity

Identity Management-as-a-Service

It seems that most people these days understand what Identity Management it. For those that don’t, it describes the management of individual identifiers, their authentication, authorization and permissions within or across system and enterprise boundaries. In other words, who are you and what can you access, either physically or virtually. The goal of identity managementRead… Read more »

Two Perspectives on Situational Awareness

There was an article in Security Products recently that discussed Situational Awareness in a maritime environment. Due to the extreme number of ships both commercial and military that are on the seas at any one time, it is imperative that you have a way to quickly identify the target, assess the threat level, and actRead… Read more »

Fraud of the Day

What would your agency do with $100 million dollars or even tens of thousands more? Agency funds are lost to fraud every day. The Fraud of the Day forum highlights real stories and what you need to know to help fight fraud. Visit the FraudoftheDay.com forum to learn more and sign up to receive dailyRead… Read more »

Fraud of the Day

What would your agency do with $100 million dollars or even tens of thousands more? Agency funds are lost to fraud every day. The Fraud of the Day forum highlights real stories and what you need to know to help fight fraud. Visit the FraudoftheDay.com forum to learn more and sign up to receive dailyRead… Read more »

Fraud of the Day

What would your agency do with $100 million dollars or even tens of thousands more? Agency funds are lost to fraud every day. The Fraud of the Day forum highlights real stories and what you need to know to help fight fraud. Visit the FraudoftheDay.com forum to learn more and sign up to receive dailyRead… Read more »

Online with multiple parts of your identity

I made the point at the Govloop conference on last Wednesday that unlike the model of Facebook that people have one singular identity online I, as other social scientists, predicate on the idea that individuals have lives in which we have a variety of identities. By identity I mean the way that each person understandingsRead… Read more »

Complete references and links for Identity theft blog

Here are the references and links to additional resources that my have been left out of my post yesterday. Identity Theft Resources http://www.legalstoc.com/2009/01/07/ftc-to-congress-enact-standards-to-reduce-identity-theft/?http://www.howtostopidentitytheftnow.comwww.creditcards.comwww.consumer.gov/idthefthttp://www.cstb.org/web/project_authenticationhttp://www.humanresources.org/media/resources/resource_209.pdfhttp://portal.acm.org/citation.cfm?id=1082290.1082305http://iospress.metapress.com/content/frcjv8nfemh5dxc9/http://www.anti-phishing.org/http://www.verisign.com/products-services/index.htmlhttp://web.njit.edu/~bieber/CIS677F04/stafford-spyware-cais2004.pdfhttp://theprivacyplace.org/blog/wp-content/uploads/2008/07/tr-2006-18u.pdfhttp://www.springerlink.com/content/w7877437n43u72hq/http://www.loms-itea.org/deliverables/LOMS_D6.3_v1.0.pdfhttp://webpages.cs.luc.edu/~pld/courses/ethics/spr07/rfid/eckfeldt.pdfhttp://www.govtech.com/gt/418253http://www.experian.com/http://www.transunion.com/http://www.equifax.com References Buell, D. & Sandhu, R. (2003). Identity management. IEEE Computer Society, 1-3. Milne, G. R. (2003). How well do consumers protect themselves from identity theft? The Journal of Consumer Affairs, (37)Read… Read more »

Help Wanted: U.S. Needs Cybersecurity Experts and Fast!

Our friends at Center for Strategic and International Studies (CSIS) recently issued a study called “A Human Capital Crisis in Cybersecurity,” that highlights how the United States is facing a chronic shortage in the quality and quantity of its cybersecurity experts. As such, the nation unprepared to defend itself against increasingly sophisticated online attacks. TheRead… Read more »

Engaging Consumers in Cyber Security: It’s Up to You

In a perfect world, consumers recognize authentic emails from fake, update their operating system, browser and anti-virus software, and have a healthy skepticism about the safety of the Internet. The bad guys hate perfect, so we should be working with consumers to stop them. I deal with the ugly aftermath of one type of cybercrime,Read… Read more »

TJX Breach Hacker Faces 17- 25-Years; He Was a Secret Service Informant??

The mastermind behind some of the most notorious data breaches in history (Heartland Payment Systems, TJX and others) faces sentencing this week. The word is that prosecutors are aiming to give Albert Gonzalez the maximum sentence of 25 years in prison. We imagine justice will be rightly served. In a bizarre twist, Gonzales was purportedlyRead… Read more »