“IBM researchers announced plans for a cloud-based technology that holds potential to help consumers better protect online personal data, including date of birth, home address and credit card numbers.

Clled Identity Mixer, it uses a cryptographic algorithm to encrypt the certified identity attributes of a user, such as their age, nationality, address and credit card number in a way that allows the user to reveal only selected pieces to third parties.

Identity Mixer can be used within a digital wallet, which contains credentials certified by a trusted third party, such as a government-issued electronic identity card. It’s important to note that the issuer of the credentials has no knowledge of how and when they are being used.”

We continue to experiment and work to get the identity thing right – once and for all.  But identity security continues to be a slippery idea, given the millions of devices and trillions of transactions every day!

IBM’s plans to fix personal identity security crisis – Computer Business Review.

 

Thanks to Computer Business Review

We continue to be appalled that our private financial information is compromised when a major retailer is hacked.

It would make more sense to this tech pro if we assumed that this would happen and then took steps to protect ourselves.

That means work.  Changing passwords, re-pinning credits cards.  Requesting new cards periodically and seeking identity protection.

Identity protection is an emerging industry.

Stay Tuned.

Staples breach exposed 1.16 million payment cards | TheHill.

Thanks to TheHill

“According to Kris Lovejoy, General Manager, IBM Security Services: “Business models are rapidly evolving as employees conduct more of their work offsite. Protecting this data and who has access to it has become a challenge, costing our clients time and money. With this acquisition, IBM provides a unique identity and access management offering that combines proven software and analytics technology with expert managed services that make it easy for businesses to tackle the complexities of security in this new digital world.” “

IBM acquires Lighthouse for cloud identity security solution | Business-Cloud.com.

Thanks to Business-Cloud.com

“When we launched Google+ over three years ago, we had a lot of restrictions on what name you could use on your profile. This helped create a community made up of real people, but it also excluded a number of people who wanted to be part of it without using their real names.

Over the years, as Google+ grew and its community became established, we steadily opened up this policy, from allowing +Page owners to use any name of their choosing to letting YouTube users bring their usernames into Google+. Today, we are taking the last step: there are no more restrictions on what name you can use.

We know you’ve been calling for this change for a while. We know that our names policy has been unclear, and this has led to some unnecessarily difficult experiences for some of our users. For this we apologize, and we hope that today’s change is a step toward making Google+ the welcoming and inclusive place that we want it to be. Thank you for expressing your opinions so passionately, and thanks for continuing to make Google+ the thoughtful community that it is.”

via Google+ drops real name policy. What do you think? [POLL] | Naked Security.

 

Thanks to Naked Security

Fortunately, we are now beginning to see some attention being paid to digital identity, a field that has been limited, primarily, to the financial services industry.

Why Digital Identity is the next major enabler for the digital economy | Daisy Group PLC.

DIVkwC1-150x150

Our prediction is that all internet users will eventually utilize their own digital identity signature that will eliminate a great deal of the clutter, cybercrime, and other invasive digital activity.  It will also validate – privately – online accounts, various credentials, and other unique digital properties that facilitate private and secure use of the Internet.

We’ll see.

Thanks to Daisy

This problem is more complicated than this post describes, if only that the violations which occur are between family members and in many cases involve addiction and substance abuse.  This is not to suggest that they are any less serious or damaging to those involved.

The proximity of credit cards and other financial information among family members is much closer and access is much easier.  So the violations, while personal, can be much harder to detect and the damage much more extensive.

Emerging trends in identity protection and management have provided us tools that add a number of technologies and protections to the prevention toolkit. Multivariate authentication and the added protection of bio validation like fingerprint, voice print, and added features make it harder for anyone, including potential threats from family members to steal.

The other difficulty is that older family members are less likely to be suspicious, more capabe of absorbing financial losses, and less skilled in the use of protection schemes.

The Emotional Consequences of Parent Identity Theft | Financial | Articles | ID Theft Blog.

Thanks to ID Theft Blog – Identity Theft Resource Center

“There is an all-out war for identity among the biggest and most successful tech companies in the world. But there’s one more player who has yet to enter the fray and could largely own online identity: Apple.”

Why Apple Is Losing The War For Online Identity | Fast Company | Business + Innovation.

Thanks to FC – Fast Company Business – Innovation

Banks seek NSA help amid attacks on their computer systems – The Washington Post.

Prediction:  This will be the year that commercial interests take cyber security seriously, if only because the number of devices and complexities of their interoperation are vastly complicating the authentication and identity landscape.

Stay Tuned

Currency of Thought
There used to be a time when words, especially “BIG” words, had a meaning that was closely shared among most of us. Big words like security or income or faith. Now that we have Twitter and hashtags, meanings seem to be changing, at least among the community who cruise Twitter every day. My company, TransXfer, is protecting digital identity. We use the #identity hashtag to classify our Twitter posts. But when you Twitter sort in early 2012 using the #identity hashtag you get mixed results of posts from a Houston celebrity, some job search posts, and a few actual “identity” tweets. While it is presumptuous for me to judge the meaning of this collection of post hashtags, the Twitter #identity followers already have, at least their individual perceptions or uses for the word “identity”. So whatever collection of posts results from a particular hashtag becomes a currency of thought or maybe “currentcy” to coin a word. That is new meaning or at least Twitter purpose.
The value (or change) of the meaning involved in the hashtag is shaped by the frequency and velocity of the tweets and the number of followers who think that the meaning “is” something. This is how social networking can actually shape changes in consciousness and thought so rapidly.
So we’ve decided to us the #transxfer hashtag instead so that we can move our brand into a searchable, sortable category that may better convey our BIG meaning. Read More →

Post Navigation