“Formerly the exclusive domain of IT, information security is now a mainstream issue, as major retailers and government agencies have suffered data breaches, denials of service and destructive intrusions. Millions of individuals have been affected, and organizations are now forced to devote more resources to prevention and remediation. Everyone in the information chain, from consumers to CEOs, has become acutely aware of the hazards of failing to protect information.”

The theme of the first quarter of 2015 seems to be Information security and who carries the responsibility for providing it to Internet users.  Last year’s breaches continue to remind us that our Identity and Internet security are ALWAYS at risk.  But until we get breached, hacked, or have our identity stolen, we still don’t pay attention.

Curious!

via Information security goes mainstream – KMWorld Magazine.

 Thanks to KMWorld Magazine

 

The symbiotic relationship between your digital identity and your social and consumer activities are now irrevocably linked – without your permission of control.  Few of us have been able to insulate ourselves from automatic identity transparency when using mobile apps and traditional computer browsers as well.  Yes, we do a pretty good job at protecting our email and financial bank and credit card accounts.  But the rest is “mush”.

Here’s a post that explains the growth of value to businesses and consumers alike for using identity validation (and transparency) to leverage revenue opportunities:

How digital identities today create business opportunities tomorrow.

Thanks to CA – Computer Associates

 

Even though our website and planned products are designed to thwart attacks to digital identity and privacy, we look at the use of the word Manifesto with some skepticism.  The word itself has a negative connotation, at least to this blogger.

During the cold war we had the Communist Manifesto. But now a security manifesto?

Regardless of what it may be called, we do need agreement about what is and what is not acceptable practice and use of the Internet.

We’ll see.

18.11 Manifesto Launch.

Thanks to The Security Institute

“This custom solution from Trustev uses “data fingerprinting” to verify a transaction’s validity. When a customer makes an in-store purchase, Trustev’s software instantly scans approximately 260 online data points to ensure the buyer is legitimate and confirm their identity. Additional enhancements through the Trustev platform include an integrated activation portal for credit authorization, as well as future online mobility sales for omnichannel capability.”

Great to see that we now have a vedor with a market-ready product to address the digital identity challenges that exist in the marketplace.

RadioShack to deploy Trustev across all stores and online.

trustev

Thanks to Trustev

Fortunately, we are now beginning to see some attention being paid to digital identity, a field that has been limited, primarily, to the financial services industry.

Why Digital Identity is the next major enabler for the digital economy | Daisy Group PLC.

DIVkwC1-150x150

Our prediction is that all internet users will eventually utilize their own digital identity signature that will eliminate a great deal of the clutter, cybercrime, and other invasive digital activity.  It will also validate – privately – online accounts, various credentials, and other unique digital properties that facilitate private and secure use of the Internet.

We’ll see.

Thanks to Daisy

trxferfoootermasIf you look around the Internet and at the usual popular magazines and journals on subscription lists and news stands, you’ll find a variety of points of view on the topic of Privacy. Due to the openness of the Internet and the First Amendment almost anything goes regarding what is and what isn’t capable of protection. A recent attempt at requiring Internet Service Providers (ISPs) to provide Parental Controls protection in Europe was met with staunch opposition from some quarters. Obviously the porn industry could be threatened seriously by such actions. Other hardware and software vendors also keep a low profile in public discussion of the privacy topic, save requirements that are mandated by consumer law in the US.

Transxfer – as a consumer oriented digital identity and privacy organization – believes it important to clarify the privacy protections it fosters and promotes. We post daily articles, links, and information on topics of interest on the following blogsites:

CIH_logo

The Cloud is Huge

 

bloggerbutton1           Closet To Cloud

 

Follow us on Twitter

twitter