ZDNet columnist Dion Hinchcliffe is wondering if the Internet of Things is strategic to the enterprise. "The real question is if IoT is strategic to our businesses? By this I mean whether or not playing early enough and deeply enough in "IoT-ifying" the enterprise will result in competitive ruin (or not.) Certainly some are rather skeptical of the strategic nature of the trend. By this argument there are really two Internets of Things. One is the enterprise-grade version that has long been in place and is already helping us run our companies. The other is consumer based."
Chris Hinkley: Convenience and Security: The New Face of Two-Factor Authentication Security may be part of an IT professional's daily world, but these days consumers are just as concerned about protecting their privacy online. It's no surprise that many businesses are trying to boost their brand image and differentiate themselves from their competitors by promising superior security. Yet there's one security action that many of them could take and don't: two-factor authentication.
Anil John: The Venn of Identity Proofing and Identity Resolution Attributes I've been spending a fair amount of time thinking about how to minimize the information asked of a person, to uniquely identify them, in order to deliver a high value public sector service to them. In particular I am interested in the overlap between what is asked for as part of identity proofing at Level 2 and Level 3 in NIST SP 800-63-2, and what studies show is needed for unique identity resolution.
Phil Hunt: Standards Corner: Preventing Pervasive Monitoring I watched NBC's interview of Edward Snowden. The past year has been tumultuous one in the IT security industry. There has been some amazing revelations about the activities of governments around the world; and, we have had several instances of major security bugs in key security libraries: Apple's 'gotofail' bug the OpenSSLHeartbleed bug, not to mention Java's zero day bug, and others. Snowden's information showed the IT industry has been underestimating the need for security, and highlighted a general trend of lax use of TLS and poorly implemented security on the Internet. This did not go unnoticed in the standards community and in particular the IETF.
Michael del Castillo: Glasshole.sh developer warns 'gadget culture' is a 'Trojan horse' Julian Oliver, a Berlin-based hacker and artist, told me in an email last night, that the code he wrote in less than an hour was about more than just taunting Google. His code lets network hosts kick off Google Glass users. The conversation Oliver sees his work as a part of focuses on the ability to "selectively" reveal one's self to the world, as he put it. He wrote that "gadget culture" has become a "formidable Trojan horse threatening that right."
Tim Bray: Where is Your Data Safe That's not a simple question, but here's my answer: Your own personal computer, if you take a few basic precautions, can be a pretty safe place to store things that matter, including secrets that matter.
Gartner Catalyst - UK June 17-18; London A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Cloud Identity Summit 2014 July 19-22; Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.
Gartner Catalyst - USA Aug. 11-14; San Diego, CA A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Application Security Forum Nov. 4-6; Yverdon-les-Bains, Switzerland The conference is a well-established annual event dedicated to information, application and software security that features a full-day of training sessions and two days of conference sessions.