25 Dec, 2014Securing the electric grid
Electric substations need to be secure and the Federal Energy Regulatory Commission (FERC) is working on standards for physical access control and identity in the energy sector.
You are here:
25 Dec, 2014Securing the electric grid
Electric substations need to be secure and the Federal Energy Regulatory Commission (FERC) is working on standards for physical access control and identity in the energy sector.
22 Dec, 2014Secure credentials are closer than you think
The model to a better digital future is already at work. The Government of Canada is providing a beacon of hope for a future without proliferating passwords and one that makes it easy for citizens to use their established credentials to access the services they need without requiring dedicated credentials for every destination – and still maintaining the privacy that citizens expect.
18 Dec, 2014Put identity at the center with a federated service
The world of access and security is exploding. Today’s identity systems are tasked with empowering new categories of users and agents while reaching into the cloud to enable new applications and enabling access from a world of new devices. We’re moving to increasingly federated systems to manage these new realities, but our identity infrastructure hasn’t kept pace.
16 Dec, 2014The future of the identity ecosystem is mobile
Consumer and personal identities are tied to mobile phones. Although most of us recognize that mobile phones are not the most secure way to exchange information and access content, the convenience factor reigns supreme. Efforts are underway, however, to make the mobile the best and most secure way to communicate identity.
15 Dec, 2014Winter 2014 Regarding ID magazine available via interactive PDF viewer
The Winter 2014 issue of Regarding ID magazine looks at the rise of mobile identity; possible revisions to the four levels of assurance; how the airport of the future will identify travelers; a look at PIV-I and CIV; new certification for physical access control and the latest NSTIC pilot winners.
12 Dec, 2014Certificates, trusted identities and the Internet of Things
Consumers wants access to data anywhere at anytime. And while this is somewhat possible at this point it’s not always that easy or secure. The Internet or Things and wearable technologies are going to start making identity easy and secure for all.
09 Dec, 2014Whither cards? Secure identities move to smart devices
Within the next five years, consumers will be carrying multiple secure identities on smart devices and not plastic cards – a move that could replace all previous mechanical keys and dedicated one-time password hardware for physical and logical access control. This single card or device will be part of an access control ecosystem that provides a seamless user experience and can flexibly scale and adapt, while also delivering growing value to the organization.
04 Dec, 2014Keys to ensuring a federated identity future
Federated identity is a concept that has been around for some years, but are we close to realizing its impact or still waiting for it to be realized? Today’s development efforts focus primarily on the specifications and policy issues that must be addressed to build so-called “trustworthy” identity systems. But these efforts may ignore a critical prerequisite to success – finding a business model that will provide incentives for businesses and users to participate in a trustworthy system in the first place.
02 Dec, 2014A history of AFIS
As we celebrate the 40th anniversary of Automated Fingerprint Identification Systems (AFIS), fingerprint matching has become a part of everyday life. Law enforcement agencies use fingerprints to solve crimes and ordinary people unlock their smart phones, clock in at work or pay for cafeteria lunches. Though the foundations for the technology are more than 1500 years old, its applications have never been more relevant.
02 Dec, 2014Abandoning identity in favor of attributes
Identity online is a vexed problem. The majority of Internet fraud today can be related to weaknesses in the way we authenticate people electronically. Internet identity is terribly awkward too. Unfortunately today we still use password techniques dating back to 1960s mainframes that were designed for technicians, by technicians.
Enter the site