Continue on this whole new level by reading more below
Ian Glazer: The Laws of Relationships (A Work in Progress) I have to admit when I first heard the noise surrounding Identity Relationship Management, I cringed, especially when people started referring to it as IRM. However, after many conversations and email threads, I still loathe the IRM name but have come around to the larger mission that Kantara has in mind. Simply put, relationship management is the future of identity and access management.
Antone Gonsalves: How to Protect Your Company From an eBay-Like Breach Employees can have their credentials stolen in many ways, such as using the same user name and password on a website that's compromised. Employees could also become victims of phishing attacks or have their laptop infected with malware that logs keystrokes and sends the information back to the hacker's server. As a matter of corporate policy, employees should be advised never to use their work credentials for logging into websites. Such advise falls under the category of employee education, which is the most effective non-technical form of security.
John Fontana. Password breaches: End-user carnage is unspoken heartache Consumers must finally see the value of their personal data and demand protections when it's shared with providers. The argument is the same for IT and enterprise user populations let loose in a world where cloud apps and services are as much a part of the network as a Cisco router. A recent Ponemon Institute report says 110 million American adults had their personal data exposed by hackers in the past 12 months alone, which totals some 432 million accounts. And that number can grow exponentially if the passwords to those millions of accounts were re-used on other accounts.
Office urges password change after security breach In an email to customers, the U.K. shoe retailer apologised and suggested customers change similar passwords elsewhere. Its chief executive said no bank or card details were compromised "in any way" and the matter had been reported to the relevant authorities.
Klint Finley: Why Tech's Best Minds Are Very Worried About the Internet of Things The Internet of Things is coming. And the tech cognoscenti aren't sure that's a good thing. For years, the prospect of an online world that extends beyond computers, phones, and tablets and into wearables, thermostats, and other devices has generated plenty of excitement and activity. But now, some of the brightest tech minds are expressing some doubts about the potential impact on everything from security and privacy to human dignity and social inequality.
Zach Epstein: The FTC wants to put online privacy back in your hands It looks like the Federal Trade Commission is finally starting to realize that some companies go too far when collecting data and building a profile of Internet users to be sold to marketers, and consumers deserve to have more control over how they are tracked online. The FTC released a new report this week titled "Data Brokers: A Call for Transparency and Accountability," in which the paper's five authors say that consumers don't know enough about how companies collect and use information about their personal browsing habits.
Chad Kohalyk: What your telecom provider knows about you Last April, The Star reported that in 2011 alone, the Canadian government asked telecoms and social media companies to turn over user data on Canadians 1.2 million times. You can send a letter requesting your data from telecom providers under PIPEDA. I decided to send my letters on May 5th and see what I got back. I use two telecom providers in Canada: Bell Mobility and Shaw Communications.
Tim Bray: Privacy levels You should be able to exchange messages privately using the Internet. My profession should be working on making this easy for everyone, including non-geek civilians who shouldn't need to understand cryptography. I've been thinking about this a lot and even slinging little bits & pieces of code; before I write any more, I think it'd be helpful to define terms.
Ron Miller: Open APIs Fuel Creation Of New Cloud Services Ecosystem There is obviously a growing market related to moving traditional on-premises enterprise software to the cloud, but what you might not know is that beyond that group of products, there is a whole other category of services being developed to support those top-level companies, whether that's security, authentication, monitoring, back up or billing and customer retention. For instance you have Zuora for billing, Backupify to back up cloud services, Ping or Okta for single sign-on and CipherCloud or FortyCloud for cloud security. And those are just a few examples of the many companies that have developed as a support system for the cloud.
Identity Relationship Management Summit June 3-5; Phoenix, AZ. Learn how IRM can drive customer relationships, business agility and revenue growth. Featuring thought leaders from Gartner, Forrester, Kantara and Salesforce.com. Sessions, both business and technical, cover IRM standards, best practices, demos, case studies and workshops.
Gartner Catalyst - UK June 17-18; London A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Cloud Identity Summit 2014 July 19-22; Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.
Gartner Catalyst - USA Aug. 11-14; San Diego, CA A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Application Security Forum Nov. 4-6; Yverdon-les-Bains, Switzerland The conference is a well-established annual event dedicated to information, application and software security that features a full-day of training sessions and two days of conference sessions.