Brian Krebs: Experian Lapse Allowed ID Theft Service Access to 200 Million Consumer Records Last week, Hieu Minh Ngo, a 24-year-old Vietnamese national, pleaded guilty to running an identity theft service out of his home in Vietnam. Ngo's ID theft business attracted more than 1,300 customers who paid at least $1.9 million between 2007 and Feb. 2013 to look up Social Security numbers, dates of birth, addresses, previous addresses, phone numbers, email addresses and other sensitive data.
Dan Gooden: Can this $70 dongle stem the epidemic of password breaches? Security researchers have developed a password storage system that uses inexpensive hardware to prevent the cracking of passwords. Rather than relying solely on a one-way cryptographic hash to represent plaintext passwords, the small dongle performs an additional operation known as hash-based message authentication code (HMAC).
Pew Research Internet Project: 15 Theses About the Digital Future The world is moving rapidly towards ubiquitous connectivity that will further change how and where people associate, gather and share information, and consume media. A canvassing of 2,558 experts and technology builders about where we will stand by the year 2025 finds striking patterns in their predictions.
Will Kruse: High Availability IAM Design Patterns (on AWS EC2) Many of you invest significant effort to ensure that a single change does not impact your entire application. If you design AWS applications, you should apply the same high availability concepts to your use of IAM so that the impact of events can be minimized or avoided completely.
Kantara Initiative: 2014 Upcoming Events EIC - May 12-16: The European Identity and Cloud Conference is an event we look forward to every year. We'll be hosting another workshop at EIC in 2014. We'll be presenting around IRM, UMA, Profiling of OpenID Connect & OAuth, and much more. Webinar - March 20: Access Management 2.0: UMA for the Enterprise; 11am-Noon (EDT). Free registration.
Interop Las Vegas; March 31-Apr. 4 Independent technology conference and expo series designed to inspire and inform the world's IT community.
Cloud Security Alliance, SecureCloud 2014 April 1-2; Amsterdam. An opportunity for government experts, industry experts and corporate decision makers to discuss and exchange ideas about how to shape the future of cloud computing security. Focus is on legal issues, cryptography, incident reporting, critical information infrastructures and certification and compliance.
Philadelphia Secure World Valley Forge, Pa.; Apr. 8-9 One of North America's most vital cyber-security conferences, providing globally relevant education, training and networking for cyber-security professionals on a regional level.
European Identity & Cloud Conference 2014 May 13-16, 2014; Munich, Germany The place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Cloud Identity Summit 2014 July 19-22,; Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.