Blog Posts Tagged with "Identity Management"


The Credit Score Ripple Effect on Your Identity

November 08, 2011 Added by:Kelly Colgan

The Wall Street Journal reports that “the proliferation of ‘scores’ highlights the widening trade in personal information, which is already fueling public concern about diminishing personal privacy...

Comments  (0)


What to Do When You Get a Data Breach Letter

July 07, 2011 Added by:Kelly Colgan

A day doesn’t go by when we read news of a data breach at a major company, healthcare facility or financial institution. Epsilon, Sony and now Morgan Stanley, are a good examples. What do you do when a data breach notification letter lands in your mailbox? The short answer: Don’t panic...

Comments  (1)


You Can't Fight Google, So Embrace Google

June 20, 2011 Added by:Allan Pratt, MBA

When creating a Google Profile, you may be as comprehensive or as minimal as you wish. But, without a doubt, include your name, photo, gender, professional overview, and some links. Take control of your Google Profile – it actually feels empowering in this era of too little online control...

Comments  (0)


NSTIC: Questions I'd be Asking

May 01, 2011 Added by:Keith Mendoza

The NSTIC is still in its infancy. However, the White House is aggressively pushing for its implementation, and we will be seeing the Identity Ecosystem pretty soon. I just hope that these very basic questions are answered in a convincing way when that time comes...

Comments  (0)


College Suffers from Digital Identity Theft

February 28, 2011 Added by:Headlines

Problems surrounding the protection of a digital identity are not just a matter of concern for individuals, as businesses and private organizations are also subject to the threat of "identity theft" by criminal enterprises...

Comments  (0)


Your Name, Your Privacy, Your Digital Exhaust

January 31, 2011 Added by:Christopher Burgess

Take a moment and review your digital exhaust. These are the nuclei of your biographic mass which will be compiled about you by any number of interested entities. I assure you, this information will not match your well articulated persona or the resume that you so painstakingly created...

Comments  (1)


What Happened to My Biometric?

November 18, 2010 Added by:Guy Huntington

There has been a significant increase in the use of biometrics for authentication. It is becoming more commonly used to purchase groceries, to gain access to premises, passing through passport control and for logging on to computers. There are some dangers with this trend...

Comments  (1)


Behavior Based Transaction Verification – More of the Same

November 17, 2010 Added by:Eli Talmor

Gartner continues to recommend fraud detection that monitors user behavior. This method captures and analyzes the user’s Web traffic, including login, navigation and transactions, and can spot abnormal access patterns that indicate an automated program is accessing the application..

Comments  (0)


Smart Grid Deployment and Identity Management

October 29, 2010 Added by:Guy Huntington

This paper outlines the challenges of deploying smart grid from an identity management and operational perspective. Legislation is forcing utilities to take on home or commercial generated power without thinking through the security, operations and identity implications...

Comments  (0)


Five Ways Identities Are Stolen Online

October 22, 2010 Added by:Robert Siciliano

Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of data breaches, and spent approximately $600 million repairing the damage. Based on these numbers, McAfee projects that companies lost more than a trillion dollars in the last year.

Comments  (1)


Identity Theft – Common Consumer Errors

July 15, 2010 Added by:Robert Siciliano

People who have been victimized by identity theft often have a difficult time functioning as a result of their circumstance. Some deal with minor administrative annoyances whiles others suffer financial devastation and legal nightmares...

Comments  (1)


LifeLock and Billionaire John Menard

July 14, 2010 Added by:Roger M

Recently I heard a radio show advertising LifeLock which used a recent attempt to rob billionaire John Menard and his bank of $475,000 as an example of why you need LifeLock - a bad example...

Comments  (4)


Road Map for an Application/Software Security Architect (Part 4)

December 15, 2009 Added by:Stephen Primost

Planning your application's use of the digital identity is not an after-thought of system architecture. At the least, it might offer the occasional lack of reliable and conflicting information. At the worst, it provides little, if no protection, at all. And like the proverbial little dutch boy, you will be putting fingers in the holes of the dike, attempting to shore up an weak infrastructure with...

Comments  (0)