How Ease-of-Use and Flexibility are Impacting IAM

The launch of Healthcare.gov last October was marred with issues.  Users who attempted to navigate the exchange were greeted by a litany of errors so egregious, including login issues, incomprehensible data entry forms, enrollment delays, and outright crashes that signing up proved to be a near impossibility. Things got so bad that one leading publication…

iBanking Mobile Bot Source Code Leaked

RSA researchers have recently traced a forum post leaking the iBanking mobile bot control panel source-code. Apart from the server-side source-code, the leaked files also include a builder (a bash[1] script) that can un-pack the existing iBanking APK file and re-pack it with different configurations, essentially providing fraudsters with the means to create their own…

Business Context: The Key to Peace, Love, and Understanding

So where are the strong? And who are the trusted? And where is the harmony? – Nick Lowe, “(What’s so funny ‘bout) Peace, Love, and Understanding” It’s a little known fact that Nick Lowe, in addition to being a fantastic songwriter and musician, is also an expert on Identity Management. It’s true! In the lyrics…

Is the Time Right for Mobile Biometrics?

There is momentum behind biometrics.  Gartner predicts that, by 2016, 30 percent of organizations will use biometric authentication on mobile devices, up from five percent today. Goode Intelligence predicts that by the end of 2015 there will be 619 million people using biometrics on their mobile devices. The time is right to investigate biometrics as…

The Changing World of Identity & Access Management

In today’s world, you can be certain of one thing: change.  Things do not stay the same.  Whether you call it the Nexus of Forces or the Third Platform, trends like cloud, mobile, big data and social are certainly impacting and changing the world of IT today. How can we, as Identity and Access Management…

Security: A Game of Risk Management

Take the best, deepest breath you can. Now, stop breathing. Sure, you’ve mastered the art of breathing, but that doesn’t mean you should stop doing so. No matter how great your last breath, or your last meal was, you will still need another one in order to survive. That is how security is for businesses.…

“One Brain” for IAM

Identity management has evolved over the last couple of decades, from mere user profile centralization in the form of directories to directory-enabled authentication and SSO, account provisioning, federation, access compliance, and, most recently, identity and access governance Identity (and access) management is no longer “the IT team’s problem.” Today, many people across business, IT, audit,…

Mo Money Mo Problems

“It’s like the more money we come across, the more problems we see” -Notorious B.I.G.  Ever since the Liberty Reserve takedown in May of last year and the confiscation of all accounts by law enforcement, fraudsters have been busy finding a solid currency to which they can entrust their spoils without the risk of losing…

Cloud Security: Does It Have to Go the Hacker Way?

Recent cloud security breaches compel us to ask: Is it time to revisit the ethos of agile development for some aspects of cloud computing? Just last October, hackers broke into a third party’s social scheduling service, plundered Facebook’s and Twitter’s OAuth access tokens, and posted or tweeted to tens of thousands of user accounts. An…

Threat Protection and the Appropriate Role of Big Data

Threat protection is becoming more difficult for a variety of reasons. The quantity of valuable information available online is growing and attracting more cybercriminals; cybercriminals are well funded; and can develop increasingly sophisticated, granular, and rapid attack techniques. Threat protection is also more difficult because there are a greater number of devices and cloud services…