revolutionary or whether they are just evolutionary and it's simply a matter of time before they are eaten up." He's leaning toward the latter, but you'll have to let him explain. "The tagline for this year's Cloud Identity Summit would have you believe that it is the former. I'm not so sure about that. Which means that with less than a month to go, I'm still not sure how Pam, Andrew and I will explore that very (existential) topic in the "Usable Identity" track we'll be presenting at CIS.
For more taglines and topics, read on.
Estonia takes the plunge There is one place where this cyberdream is already reality. Secure, authenticated identity is the birthright of every Estonian: before a newborn even arrives home, the hospital will have issued a digital birth certificate and his health insurance will have been started automatically. All residents of the small Baltic state aged 15 or over have electronic ID cards, which are used in health care, electronic banking and shopping, to sign contracts and encrypt e-mail, as tram tickets, and much more besides--even to vote. Starting later this year, Estonia will issue ID cards to non-resident "satellite Estonians", thereby creating a global, government-standard digital identity.
Rawlson King: Senate allocates $249 million for biometrics at U.S. border The U.S. Senate Appropriations Subcommittee on Department of Homeland Security (DHS) yesterday approved funding legislation that provides $249 million for the Department's Office of Biometric Identity Management (OBIM). OBIM supports the Department of Homeland Security's responsibility to protect the U.S. by providing biometric identification services that help federal, state, and local government decision makers accurately identify the people they encounter and determine whether those people pose a risk to the country.
Daniel Ingevaldson: Anatomy of a Hack - Mobile Banking Applications One of the things that we do at Easy Solutions, to help protect banks from fraud, is perform passive monitoring on paste sites, social media sites, and the black market. We see all kinds of crazy things and we wanted to share this example. In the case below, we found what appeared to be source code for one of our client's mobile banking apps. We pay attention to this kind of thing because evidence of publication of source code can lead directly to increased attacks--especially as they relate to mobile apps.
Dustin Volz: Privacy Groups Sound the Alarm Over FBI's Facial-Recognition Technology More than 30 privacy and civil-liberties groups are asking the Justice Department to complete a long-promised audit of the FBI's facial-recognition database. The groups argue the database, which the FBI says it uses to identify targets, could pose privacy risks to every American citizen because it has not been properly vetted, possesses dubious accuracy benchmarks, and may sweep up images of ordinary people not suspected of wrongdoing.
Chris Haddad: SOA & API Strategy, Tactics, and Convergence During the SOA craze days in the past, proponents pitched SOA's lofty benefits from both business and technical perspectives. The benefits are real, yet sometimes very difficult to obtain. Surprisingly, today's API proponents target similar benefits, but with an execution twist.
Kin Lane: If I could design my perfect API design editor: I've been thinking a lot about API design lately, the services and tooling coming from Apiary, RAML and Swagger, and wanted to explore some thoughts around what I would consider to be killer features for the killer API design editor. Some of these thoughts are derived from the features I've seen in Apiary and RAML editor, and most recently the Swagger Editor, but I'd like to *riff* on a little bit and play with what could be the next generation of features.
Paul Madsen: Authorization model for home automation Smartphones promise to play an important role in the management and control of Home Automation (HA) solutions. When things and devices have either no or a constrained user interface (UI), the phone's display becomes more and more relevant to managing devices. Additionally, new capabilities for biometric authentication to the phone such as Apple's Touch ID will help secure these management features.
Four universities to receive electric vehicles for Internet of Things research projects Internet2 and Innova UEV LLC, manufacturer of an all-electric micro vehicle--the Innova Dash, today announced the selection of four universities to each receive four of the uniquely equipped electric vehicles for research to reduce the campus's carbon footprint, foster research involving sensor data, use Internet2's advanced technologies and broaden understanding of the Internet of Things phenomenon.
Cloud Identity Summit 2014 July 19-22; Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.
Gartner Catalyst - USA Aug. 11-14; San Diego, CA A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Application Security Forum Nov. 4-6; Yverdon-les-Bains, Switzerland The conference is a well-established annual event dedicated to information, application and software security that features a full-day of training sessions and two days of conference sessions.