HackDig : Dig high-quality web security articles for hacker

Current Trends in Identity and Access Management: July 2017

Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many people are beginning to understand the business processes it represents as well. They therefore view it as an
Publish At:2017-07-05 12:40 | Read:3005 | Comments:0 | Tags:CISO Cloud Security Identity & Access Security Intelligence

Reimagining the Future of Identity Management With Blockchain

Every business and social transaction is carried out by people. People are known by their identities. Hence, identity drives every business and social interaction. In today’s digital age, an individual’s identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not li
Publish At:2017-03-08 04:55 | Read:4612 | Comments:0 | Tags:Identity & Access Blockchain Digital Identity identity Ident

How Can You Quantify the Value of Web Access Enforcement?

In the world of security, there is a constant struggle to justify spending, show business value and quantify positive impacts. But too often there is not enough funding, and security becomes important only after a crisis. The value of the identity and access management (IAM) domains is different because it doesn’t just address risk — it can lead to ope
Publish At:2016-12-14 13:10 | Read:4847 | Comments:0 | Tags:CISO Identity & Access Access Governance Access Management i

Explained: Doxing

Definition of Doxing (sometimes written as doxxing): gathering identifiable information about a person or a group of people with the objective to shame, scare, blackmail or bully the target. What is it? The technique as such was already known in the 1990’s when Usenet users researched and posted the real names belonging to online handles that they had an arg
Publish At:2016-02-15 13:00 | Read:4110 | Comments:0 | Tags:Online Security domain privacy dox doxbin doxing doxxing hav

Rethink the Personal Identity Ecosystem Using Digital Identification Documents

Personal Identity Instruments Today our personal identity is collected, captured and rendered by identity-issuing institutions. The plastic card is the common format used to convey that a trusted institution has certified your identity. However, we all know that this trust model is plagued with fraud issues. The most common personal identity instrument, the
Publish At:2016-01-23 10:50 | Read:3881 | Comments:0 | Tags:Identity & Access Digital Identity identity Identity Governa

How Can Access Management Platforms Improve Cloud Security?

Traditional enterprise access management is rooted on-premises. A centralized access management platform lets security administrators remove authentication and authorization logic from business applications, saving application developers time and increasing security by providing uniformity of access controls. That works well when employees and customers prim
Publish At:2015-11-04 15:25 | Read:3476 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

Elementary, My Dear Cognitive Identity Watson

A few days ago, IBM CEO Ginni Rometty announced the Cognitive Business initiative. This journey is supported by IBM Watson, the cognitive computing system that understands and learns from natural language. The name Watson is not an homage to Sherlock Holmes’ friend and assistant Dr. John Watson, but rather to Thomas J. Watson, IBM’s first CEO and
Publish At:2015-10-20 15:15 | Read:3129 | Comments:0 | Tags:Identity & Access identity Identity and Access Governance (I

How the way you type can shatter anonymity—even on Tor

Security researchers have refined a long-theoretical profiling technique into a highly practical attack that poses a threat to Tor users and anyone else who wants to shield their identity online.The technique collects user keystrokes as an individual enters usernames, passwords, and other data into a website. After a training session that typically takes
Publish At:2015-07-28 23:20 | Read:2947 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab anonymity beha

IAM: Proprietary Vs Cloud

IAM: Proprietary Vs Cloud Posted by Kevin on June 1, 2015.Wisegate will shortly publish the results of a survey into the current state of Identity and Access Management (IAM) maturity within business. Almost 150 CISOs took part. What we’re going to look at today is attitudes towa
Publish At:2015-06-02 05:20 | Read:3396 | Comments:0 | Tags:Insights Beanstalk CISO IAM identity verify Cloud

NSTIC – it will prove our identity but will it protect our privacy?

NSTIC – it will prove our identity but will it protect our privacy? Posted by Kevin on May 4, 2015.NSTIC, the National Strategy for Trusted Identities in Cyberspace, is an Obama initiative designed to make internet usage more secure for everyday users. It will do this by allowing third
Publish At:2015-05-04 12:30 | Read:3520 | Comments:0 | Tags:Insights identity NSTIC passwords privacy verify

Summary of Last Year's ICO Enforcement Action

PwC UK has published a summary of enforcement actions taken by the Information Commissioner's Office (ICO) in 2014.The Privacy and Security Enforcement Tracker 2014 summarises and comments on information originally published by the ICO on its web site concerning actions it has taken against organisations. This includes enforcement notices, monetary penalty n
Publish At:2015-04-28 06:00 | Read:3059 | Comments:0 | Tags:administrative privacy corrective identity data protection t

Governance and Consumer Identity Ride the Double-Decker at Gartner’s IAM Summit in London

As organizations grow and extend into new business models, so does the challenge of managing identities and access privileges. The Gartner IAM Summit, which was held from March 16 to March 17 in London, allowed customers and vendors alike to get together and discuss new advancements, challenges and trends in identity and access management (IAM). The conferen
Publish At:2015-03-28 01:00 | Read:3160 | Comments:0 | Tags:CISO Cloud Security Identity & Access Mobile Security authen

Web Site Oops Roundup

Some news stories about web site security incidents caught my eye in the last week.These events outline some disappointing behaviour:The Association of Chief Police Officers (ACPO) say a contractor's error led to the existence of an unsecure (HTTP) connection on its website where sensitive personal data was submitted; the ICO was notifiedIntuit, the makers o
Publish At:2015-03-10 06:50 | Read:8417 | Comments:0 | Tags:administrative authentication SSL cryptography operation ide

Till We Have Faces

Till We Have Faces I got a message the other day from an old friend.  He left the country over four decades ago, and I’ve only seen him once, since, fairly shortly after he left.I’m unfollowing a celebrity on Twitter today.(Yes, of course I am going to relate these two even
Publish At:2015-02-24 11:50 | Read:2425 | Comments:0 | Tags:Rob Slade Security Social Media Uncategorized authentication

Three credit card transactions could reveal your identity

A recent study on the use of metadata to de-anonymize users revealed that three credit card transactions could reveal your identity. Privacy is the great utopia of a society based on the technology, every action we make leaves a track that could be used to reveal our identity, track our profile and monitor our habits. We have
Publish At:2015-02-01 09:05 | Read:2849 | Comments:0 | Tags:Digital ID Hacking anonymity card transactions digital ident


Share high-quality web security related articles with you:)


Tag Cloud