Identification is a process whereby an identity claim is made and evaluated. Organic Operations Humans do this very naturally when we learn one another’s look, voice, walk and other mannerisms. The more intimately we know someone the more difficult it is to forge or impersonate that identity in our presence. The complexity of identification is compounded… Continue reading Identification Performed by Humans
5:30 Sunday Morning
5:30 and I’ve been up a couple of hours reading scientific, DoD, DARPA & infosec papers in “active authentication.” #cantsleep God bless people who think identity is easy. Assertion, validation, authentication, re-evaluation … we humans do this so organically & yet we’re unbelievably horrible at judging character. Now we expect machines to learn effectively how… Continue reading 5:30 Sunday Morning
Cool Tool For Passwords
If you want to generate strong passwords but you don’t want to store them in the Cloud or on your hard drive Passera is a handy tool for you. You can come up with your own passphrase of up to 64 characters, enter it into Passera and use the resulting hash as your password… Continue reading Cool Tool For Passwords
Disney Identity Starts With 80,000 Customers
SecureID News reports that Disneys MagicBand IDs are a great success, having been used by some 80,000 attendees in 2014. The enhancement cost $1 billion and should open new revenue streams or enhance existing ones by EoY, 2014. I would expect an interesting increase in traffic over Disney’s backbone to keep up with near real-time response needed… Continue reading Disney Identity Starts With 80,000 Customers
Legacy Risk Corollary
Risk management encompasses risks to privacy, network, process, brand, etc. I’m interested in a juncture of two threat vectors in this post. Legacy, in this context, refers to things that have been in-place for a long time. Often they are heavily depended upon so that they cannot easily be replaced without significant cost and concurrent risk.… Continue reading Legacy Risk Corollary