Paul Madsen: Let IoT Devices Authenticate Their Users When we think about things and authentication, often we focus on how to authenticate the things into other network components, i.e., other things, hubs, and cloud end-points. But the flip side of authenticating things is using things to authenticate us.
"The following proof point is considered 'should' or 'optional' for the POC execution, time permitting: Authentication - Present a wearable device instead of PIN."
Patrick Thibodeau: Can we talk? Internet of Things vendors face a communications 'mess' Vendors will tell you that the Internet of Things (IoT) is here today. We're here to tell you that it isn't. This is your warning label. It's the small print on the prescription that outlines all the nasty complications. The first thing to realize is that many wireless communications protocols that allow home devices to exchange information aren't interoperable.
New Jersey academy uses biometrics to improve campus safety Oak Hill Academy in Lincroft, N.J., recently implemented a palm-powered entry management system to control access to the school. Additionally, the apparatus makes forgery extremely difficult by only reading palms with active blood flow.
Info Sec UK April 29-May 1; London More than 13,000 attendees to Europe's largest free-to-attend conference. Identity management, mobile, managed services and more.
IIW May 6-8, Mountain View, Calif. The Internet Identity Workshop, better known as IIW, is an un-conference that happens at the Computer History Museum in the heart of Silicon Valley.
Glue Conference 2014 May 21-22; Broomfield, Colo. Cloud, DevOps, Mobile, APIs, Big Data -- all of the converging, important trends in technology today share one thing in common: developers.
European Identity & Cloud Conference 2014 May 13-16, 2014; Munich, Germany The place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Gartner Catalyst - UK June 17-18, London A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Cloud Identity Summit 2014 July 19-22, Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.
Gartner Catalyst - USA Aug. 11-14, San Diego, CA A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.