Intel Security announced the limited release this week of True Key – a cross-platform consumer application designed to take the frustration out of remembering passwords.
07 Jan, 2015True Key enables password management across multiple devices
06 Jan, 2015Authentication in the IoT – challenges and opportunities
Any article on the Internet of Things (IoT) will point out that the IoT must be secure in order for its value to be realized. Generally the point is made by describing a scary scenario where an attacker is able to access data or perform an operation by impersonating a valid user, highlighting the importance of authentication to the IoT.
05 Jan, 2015End of life for fed’s four levels of assurance?
Kill them? Revise them? Industry ponders options
The four levels of assurance are oft cited as guidelines for how much an identity can be trusted. But they are also oft criticized as being too rigid and not accommodating to to all markets. How is the government and others viewing these levels and how might they change in the future?
05 Jan, 2015Holograms important part of multi-layered security
The International Hologram Manufacturers Association is predicting the growing use of holograms to help secure goods and documents.
02 Jan, 2015How cards and mobile devices will both serve as identity tokens
Cards will not be going away any time soon. They along with mobile devices will work together seamlessly within a centralized identity management system that will support both form factors. These new systems will support their use across multiple applications and on a growing range of digital platforms beyond smartphones including wearables.
31 Dec, 2014Identity at cliff’s edge: Jump or stagnate?
2014: the year of password breaches, Internet of Things and biometric handsets. True, some of these started earlier, but this year saw these technologies blossom and breaches widen. These are three separate things right now, but they lead up to one thing: the mobile handset as an identifier.
30 Dec, 2014Internet of Things presents, challenges, threats and opportunities
The proliferation of connected devices and the Internet of Things for identity presents challenges and threats, but if we are successful, it also presents a grand scale of opportunities. Networked devices and sensors make up the fabric of the Internet of Things (IoT) and leveraging mobile devices, sensors, and wearables is key to the future of identity and personal data. As the IoT becomes pervasive, Kantara Initiative is focusing to discover strategic issues present at the intersection of identity, IoT and usability.