Sean Deuby, Windows IT Pro, is an astute observer of the identiverse. He has a good summary of what he saw in 2013.
Sean Deuby: The Year In Identity, 2013 Edition It's December, and that makes it a good time to look back on 2013 to summarize some of the year's high and low points in the identity field. I've also included some remarks from an interview with Ping Identity's CEO Andre Durand on the state of identity today, and where it's going.
Read on for more identity news:
Brad Tumy: Finally connected the dots ... A few days later my wife and I were chatting about letting the kids have more access to social media and she said, "well I still have the kids convinced that you can see everything they do on our home network". A lightbulb immediately went on over my head.
Mike Schwartz, Gluu: Go West Young Federation! Several countries are helping businesses to start federations. For example, there is the British Business Federation Authority. At the IdentityNext conference last month in the Hague, I was lucky to hear Rainer Hörbegive talk about the Austrian Identity Federation Authority, which aims (1) to establish and nourish multiple identity federations for B2B and B2C business cases; (2) to help business-specific federations adapt to local needs; and (3) to consolidate federations over time through the promotion of common principles, rules and procedures.
Matt Pollicove: What comes after IDM? As I've discussed before, it's really up to what the organization requires and simply tacking on new workflows, approvals, and functionality is only really useful if it will actually be used. However, I think we can make a few generalizations about what might occur as part of a far reaching and comprehensive IdM program.
ZDNet's top products and tech trends for 2013: Biometrics hit the mainstream The obvious solution is two-factor authentication: something you have plus something you know. And the best accompaniment to a password is biometric proof that you are who you say you are. Apple's TouchID, integrated into the iPhone 5S this year, was noteworthy as the first example of fingerprint reading technology integrated into a mainstream tech product. (A publicity stunt involving an alleged hack got far more coverage than it should have.)
Chuck Mortimore: Salesforce Identity: Connecting Employees, Customers, Partners, and Apps With the proliferation of cloud applications, mobile devices, and industry trends like Bring Your Own Device (BYOD), IT organizations are increasingly challenged with how to manage and gain transparency into user access to systems and applications. Salesforce Identity helps address these issues by providing IAM for web and mobile applications, built on the trusted Salesforce Platform. Join us to get a broad overview of how Identity can help better connect you with your employees, customers, and partners, and usher in a transformation around apps and mobile devices.
The Fuzzy Future Of Identity Management The traditional worker bee comes into the office, logs in to a dedicated computer via Microsoft Active Directory credentials, and gets access to local applications and data shares needed to conduct daily activities. Simple, familiar, controlled -- and totally out of date for companies dealing with mobile devices, cloud computing, BYOD, and the blurring line between work and home, business and personal.
RSA: Behind the Scenes of a Fake Token Mobile App Operation The *iTMO component of a banking Trojan is designed to overcome a single obstacle: out-of-band authentication using mobile devices. By installing a malicious "*iTMO app" on the device, the botmaster can intercept SMS messages and/or telephone calls thus defeating the OOB authentication. It is one such app that we recently analyzed.
Pentagon ponders going mobile with CAC Speaking at a recent AFCEA event in Washington, DOD officials said they are examining possibilities in Near-Field Communications -- the technology that allows some Android users to share data by touching phones -- as well as in derived credentials employed via options such as microSD and SIM cards that are inserted into devices. Even biometric identification is on the table to move the Pentagon away from the bulky external card readers on which CACs rely.
NSA uses Google cookies to pinpoint targets for hacking The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance.
Identity Woman: Interesting events in 2013 This is a calendar of events that I know in 2013 (and beyond). I think they're interesting, I'm currently planning on attending all the events in BLACK, I'm helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach.
Kantara Initiative: 2014 Events on the Horizon As we move to close 2013 we're already excited by all of the opportunities for 2014. Planning is underway on some exciting initiatives and great events for 2014! A taste of the details are below.
NSTIC Pilots in Motion - Jan. 30: This is a special event produced by Kantara and hosted at the Department of Commerce in Washington DC. The event is an industry day that will feature NSTIC pilots where Kantara is playing a role. Please send an inquiry to email@example.com.
HIMSS - Feb. 23-27: The is the second year in a row Kantara will be hosting a workshop at HIMSS. This conference goes big and we love the theme: Innovation, Impact, Outcomes, Onward!
RSA - Feb. 24-28: We have Kantara Members appearing on conference agenda topics and we're very happy to bring the next installment of "Non-Profits on the Loose".
EIC - May 12-16: The European Identity and Cloud Conference is an event we look forward to every year. We'll be hosting another workshop, and we'll be presenting around IRM, UMA, Profiling of OpenID Connect and OAuth, and much more.