<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Identity Insider</title>
	<atom:link href="https://identityinsider.org/feed/" rel="self" type="application/rss+xml" />
	<link>https://identityinsider.org/</link>
	<description>Inspiring identity with insight</description>
	<lastBuildDate>Thu, 13 Mar 2025 07:16:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://identityinsider.org/wp-content/uploads/2019/09/cropped-Insider-Fav-Icon-2-32x32.png</url>
	<title>Identity Insider</title>
	<link>https://identityinsider.org/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">240523136</site>	<item>
		<title>Government Website in India Hacked by Crypto Mining</title>
		<link>https://identityinsider.org/government-website-in-india-hacked-by-crypto-mining/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Fri, 21 Sep 2018 12:20:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cloud-Based IAM Solutions]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAM Solutions]]></category>
		<category><![CDATA[Identity and Access Management]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6088</guid>

					<description><![CDATA[<p>Hackers have targeted government websites...</p>
<p>The post <a href="https://identityinsider.org/government-website-in-india-hacked-by-crypto-mining/">Government Website in India Hacked by Crypto Mining</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Hackers have targeted government websites in India with malware in order to conduct illicit cryptocurrency mining</strong>.</p>
<hr />
<p>The government of India has a contentious relationship with cryptocurrency. Currently, the country’s Supreme Court is working to come up with a verdict in the ongoing dispute between exchanges and the Reserve Bank of India (RBI), which had ordered that all banks and financial institutions have no dealings with crypto exchanges or traders. Yet the government is an active, albeit unknowing, participant in cryptocurrency mining, although such a situation has only recently come to light.</p>
<h3>Government Websites Hacked</h3>
<p>Shakil Ahmed, Anish Sarma, and Indrajeet Bhuyan are three security researchers who have combed through government websites. They found that hundreds of government websites in India have been compromised with cryptojacking malware and are being used for crypto mining.</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-6089 size-full" src="http://identityinsider.org/wp-content/uploads/2018/09/government-bog.png" alt="" width="1920" height="1080" srcset="https://identityinsider.org/wp-content/uploads/2018/09/government-bog.png 1920w, https://identityinsider.org/wp-content/uploads/2018/09/government-bog-300x169.png 300w, https://identityinsider.org/wp-content/uploads/2018/09/government-bog-768x432.png 768w, https://identityinsider.org/wp-content/uploads/2018/09/government-bog-1024x576.png 1024w" sizes="(max-width: 1920px) 100vw, 1920px" /></p>
<p>The researches started with AP government websites due to the fact that they receive 1.6 million visitors a month. Security researcher Indrajeet Bhuyan notes:</p>
<blockquote><p>Hackers target government websites for mining cryptocurrency because those websites get high traffic and mostly people trust them. Earlier, we saw a lot of government websites getting defaced (hacked). Now, injecting cryptojackers is more fashionable as the hacker can make money.</p></blockquote>
<p>The security researchers notified one chief minister about their findings. Yet they found that the sites were still running the malware a week later.</p>
<h3>Cryptojacking in India</h3>
<p>The team of researchers found that the cryptojacking malware affected more than government websites. More than 119 public websites have also been found to be compromised. A popular choice for the malware is Coinhive, which is normally used to mine Monero.</p>
<p>In fact, cryptojacking is becoming so prevalent that India comes in at number two in countries with internet-connected devices being hijacked for illicit crypto mining. The country, with its ‘s 13,500 infected home routers, only lags behind Brazil for the dubious distinction.</p>
<p><img decoding="async" class="alignnone size-full wp-image-6061" src="http://identityinsider.org/wp-content/uploads/2018/09/MongoDB-Account-Exposes-Files.jpg" alt="MongoDB-Account-Exposes-Files" width="1920" height="1080" srcset="https://identityinsider.org/wp-content/uploads/2018/09/MongoDB-Account-Exposes-Files.jpg 1920w, https://identityinsider.org/wp-content/uploads/2018/09/MongoDB-Account-Exposes-Files-300x169.jpg 300w, https://identityinsider.org/wp-content/uploads/2018/09/MongoDB-Account-Exposes-Files-768x432.jpg 768w, https://identityinsider.org/wp-content/uploads/2018/09/MongoDB-Account-Exposes-Files-1024x576.jpg 1024w" sizes="(max-width: 1920px) 100vw, 1920px" />Rajesh Maurya, regional vice-president of Fortinet, says:</p>
<blockquote><p>Crypto mining activity is becoming a very big business in India. This technology is most effective on illegal video-streaming websites where people stay for hours watching movies or TV series.</p></blockquote>
<p>Fortinet recently released a report that found cryptojacking to be an expanding enterprise. They found that 13 percent of all organizations in the fourth quarter of 2013 were infected by cryptojacking malware. The percentage jumped up to 28 percent of companies in the first quarter of 2018.</p>
<p>One would expect that crypto mining malware is here to stay. While Google and other app stores have banned apps that feature any kind of cryptocurrency mining, cryptojacking will likely continue to rise. Hackers can easily slip the script onto websites and begin generating revenue that is instantly transferred anywhere in the world. Such ease of use, profits, and lack of any real consequences will ensure that such hacking will not stop, or even slow down, any time soon.</p>
<h5>Source: <a href="https://www.livebitcoinnews.com/government-websites-in-india-hacked-for-crypto-mining/" target="_blank" rel="noopener">https://www.livebitcoinnews.com/government-websites-in-india-hacked-for-crypto-mining/</a><br />
Author: Jeffrey Francis</h5>
<p>The post <a href="https://identityinsider.org/government-website-in-india-hacked-by-crypto-mining/">Government Website in India Hacked by Crypto Mining</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6088</post-id>	</item>
		<item>
		<title>Shady Ethics in the IAM Industry</title>
		<link>https://identityinsider.org/shady-ethics-in-the-iam-industry/</link>
		
		<dc:creator><![CDATA[Nitaant Singh]]></dc:creator>
		<pubDate>Thu, 20 Sep 2018 05:31:59 +0000</pubDate>
				<category><![CDATA[IAM]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6080</guid>

					<description><![CDATA[<p>IdentityInsider would like to talk...</p>
<p>The post <a href="https://identityinsider.org/shady-ethics-in-the-iam-industry/">Shady Ethics in the IAM Industry</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>IdentityInsider would like to talk today about the ethics prevalent in the IAM industry – or the lack thereof.</p>
<p>It takes a little thinking, but upon doing so one comes to see that the field of IAM (a subset of the field of Cybersecurity) is not your typical industry. While there are sales and profits to be made, enterprises that endeavor to be providers in this space must realize that they are providing a morally-essential service. From businesses to other businesses, to customers, and to the public, the fundamental purpose of IAM is to protect against crime. We are not selling Rolexes and Rolls Royces here – we are guardians of the people and their right to privacy and security. As such, IdentityInsider has assessed the industry’s landscape and found it very wanting.</p>
<p><strong><img decoding="async" class="alignnone size-full wp-image-6081" src="http://identityinsider.org/wp-content/uploads/2018/09/shady-ethics.png" alt="" width="860" height="300" srcset="https://identityinsider.org/wp-content/uploads/2018/09/shady-ethics.png 860w, https://identityinsider.org/wp-content/uploads/2018/09/shady-ethics-300x105.png 300w, https://identityinsider.org/wp-content/uploads/2018/09/shady-ethics-768x268.png 768w" sizes="(max-width: 860px) 100vw, 860px" />Let’s start with establishing an informal code of ethics for this industry.</strong></p>
<p>We are fighting crime here. Our opponents are criminals. As such, the industry must strive to be constantly responsive to developments in the world of hacking. It must strive to pool its resources to improve the solutions that can serve and protect.</p>
<p>Even the ‘best’ in the industry fail dismally at this. Reports from some lesser known IAM organizations have shown us that the ‘free flow of information’ that would create an environment of healthy competition (an ethical concept in any industry – data and identity security apart) and improve solutions for consumers, is non-existent. It seems that organizations such as Okta and Centrify have configured their websites to not provide data such as Whitepapers to their competitors. Attempting to download (or even purchase their solutions) using a company email address from a competitor results in a vague system error.</p>
<p>Come on! We are not even talking about protecting confidential company information here! The same white sheet is available freely if you sign up with an email address that does not belong to one of these companies. Okta and Centrify (and others) know that they cannot (and should not) stop others from reading this information but have chosen to not be upfront about their refusal to participate ethically in the industry. Instead, they make competitors falsify information to get the data. It is apparent that they do not truly care about fighting cyber-crime at all costs. Instead, a derived sense of superiority and a hostile attitude seem to be their philosophies.</p>
<h3 style="text-align: center;">Overcharging the Innocent</h3>
<p>Another awful trend is the sinful pricing of most IAM solutions. We have interviewed the industry and found that healthy profits can be made by charging microfractions of the prices prevalent in the industry. This is especially true with the advent of IAM in the Public Cloud. It is all intellectual property and selling solutions without implementation costs next to nothing (once the initial R&amp;D costs are covered.) IdentityInsider is not saying that these companies should turn into charity organizations, but there is tremendous scope for being better citizens and having self-respect.</p>
<h3 style="text-align: center;">R&amp;D and Offerings that Do Not Reflect Needs</h3>
<p>Here’s another sad truth that we discovered. It seems that organizations frequently pay millions for IAM solutions that never get fully implemented. An organization may buy a solution for millions of dollars, see a 1 or 2 year implementation time, and find that only 5 applications have been integrated at the end of this period. Upon probing, we found that this occurs because vendors are selling solutions to companies that have not been built for them. They are instead engineering products that can be sold to as many customers as possible. These products are bloated in features (typically fitting the use cases only of large enterprises with big wallets) and therefore in their cost. They are also not designed for specific use cases (or in general, for smaller companies), and many (often fatal) obstacles are found in the implementation process when they try to fit a square peg into a round hole.</p>
<h3 style="text-align: center;">The (Sad) State of the IAM Landscape</h3>
<p>A good standard to judge a vendor – particularly in an industry such as IAM that must have a strong ethical foundation– is whether they cater to the existing needs of organizations by securing them as they are, or simply try to sell generic products (sometimes seemingly cutting-edge). Unfortunately, the IAM industry is full of vendors looking for just another business opportunity. They create solutions that are responses to the trending IT landscape (eg. Public Cloud), without a care for the actual situation of potential customers. They tell you that cloud is the future (so what if it is?), and that you must migrate to it to avail their solutions.</p>
<h3 style="text-align: center;">The Lowest Common Denominator Must be Served</h3>
<p>The biggest example of this behavior is the complete lack of Single Sign-On and Provisioning support in the industry for thick-client apps. All kinds of organizations still rely heavily on thick-client apps such as ERPs (SAP etc.) and other device specific apps (like in manufacturing). It is both too expensive, and sometimes a poor idea in terms of security to migrate. It is often safer to have a local, on-premise server and app installation than to have it on a Public Cloud. The industry has chosen to completely ignore this blatant need, claiming that ‘the cloud is the future’ and because that’s where they feel the real money is.</p>
<h3 style="text-align: center;">Wake Up IAM – You are Servants</h3>
<p>Organizations are currently getting the short end of the stick from the IAM industry. The sharks that have taken over the vendor landscape only really seem to care about bottom lines and not about providing proper security, ease of access, and integrating admin security functions to protect people the best they can from cyber-threats.</p>
<p>Here at IdentityInsider we are 100% committed to this vision, urge vendors to do the same, and hope we can make the world at large more aware about the state of this industry so that they can choose their vendors with wisdom. A company that does not care about proper security does not care about you. If they do not care about you, they cannot protect you.</p>
<p>The post <a href="https://identityinsider.org/shady-ethics-in-the-iam-industry/">Shady Ethics in the IAM Industry</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6080</post-id>	</item>
		<item>
		<title>Current Trends in Identity and Access Management: July 2017</title>
		<link>https://identityinsider.org/current-trends-in-identity-and-access-management-july-2017/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Fri, 07 Sep 2018 10:11:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cloud-Based IAM Solutions]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAM Solutions]]></category>
		<category><![CDATA[Identity and Access Management]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6062</guid>

					<description><![CDATA[<p>Identity and access management (IAM)...</p>
<p>The post <a href="https://identityinsider.org/current-trends-in-identity-and-access-management-july-2017/">Current Trends in Identity and Access Management: July 2017</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many people are beginning to understand the business processes it represents as well. They therefore view it as an IT operations topic. The truth is likely both: It blurs the lines between security and operations.</p>
<p>Recent trends in this area reflect the mainstreaming of IAM into the business. My colleagues and I have seen this manifested in five important ways, and we expect these trends to continue in the coming year. Each of these areas represents an opportunity for chief information security officers (CISOs) to take advantage of recent trends.</p>
<h2>1. Chief Marketing Officers and Chief Operating Officers Are Asking for IAM Data</h2>
<p>What do Google, Facebook, Twitter and other companies value most? What have they gotten very good a collecting? The answer is information about their user base. They know who we are, when we’re active and all about our browsing habits. They use this to create targeted advertising and have monetized it.</p>
<p>Not all companies are interested in monetizing user behaviors for advertising, but most companies can benefit from better understanding their users. While an IAM solution can’t provide all of this, it can provide the most elemental data point: who the user is — their identity.</p>
<p>We have recently seen CMOs and COOs asking chief information officers (CIOs) for information about users. Basic demographic information is available in a user directory, and that is a good start, but they want more. They want session and website access information. Being able to understand who a user is (first and last name, email, phone number) and track their behaviors from their login across their full user session, requires data from the user directory and the web access management solution. They want to compile these, together with <a href="https://www.ibm.com/us-en/marketplace/qradar-user-behavior-analytics?ce=ISM0484&amp;ct=SWG&amp;cmp=IBMSocial&amp;cm=h&amp;cr=Security&amp;ccy=US" target="_blank" rel="noopener noreferrer">user behavior analytics systems</a>, to understand specific usage patterns.</p>
<p>For example, for an auto parts retailer, data could reveal that approximately 50 auto repair shops in the Greater Denver area are frequently abandoning their cart after viewing brake fluid on their site. This trend could be driven by a competitor offering a lower price or more options. Without this level of analysis, and without knowing who the users are and where they are located, this type of conclusion isn’t possible.</p>
<h3>Opportunity for Security</h3>
<p>This appears to be a net-new demand that hasn’t reached critical mass. It presents an opportunity to CISOs, because the CMO and COO may have funding available for IAM initiatives and could influence the board or others executives to make IAM a priority. This unlikely partnership also offers CISOs the opportunity to evangelize the other benefits of IAM, namely increased security and operational efficiency.</p>
<h2>2. Insider Threats Can Be Identified and Stopped</h2>
<p>Big data is here, and it’s starting to be leveraged by IAM teams. By compiling access logs and events from servers, networking devices, middleware, IDS/IPS, vulnerability management solutions, and applications, it’s possible to correlate these activities and identify trends. These can represent terabytes of data. Enter the big data solutions and <a href="https://securityintelligence.com/ibm-qradar-advisor-with-watson-revolutionizing-the-way-security-analysts-work/" target="_blank" rel="noopener noreferrer">security-specific tools</a>.</p>
<p>Historically this has been very successful for external threats, which have very little identity data context. It has been proven to be effective when someone penetrates the exterior or malware is deployed. CISOs now have visibility and the ability to respond, sometimes within minutes. There is now a broad realization that internal users (specifically internal privileged accounts) have much more value to attackers when compromised. So, we are now being asked how to leverage this data to identify and respond to <a href="https://securityintelligence.com/five-steps-to-protect-your-critical-data-from-insider-threats/" target="_blank" rel="noopener noreferrer">internal threats</a> — for events that do contain identity information.</p>
<h3>Opportunity for Security</h3>
<p>Security in this area can be achieved through four essential activities. Technologically, all the tools are available. Now it’s time to use them.</p>
<ol>
<li>Identify your most valued assets (e.g., data, applications, etc.).</li>
<li>Identify and integrate privileged user repositories to understand who these users are.</li>
<li>Collect activities on critical infrastructure in the central security intelligence and event management (SIEM) solution.</li>
<li>Identify expected activities for each user type and create runbook use cases to respond to events that are outside of these.</li>
</ol>
<h2>3. Cloud-Based IAM Solutions Have Reached a Critical Level of Maturity</h2>
<p>In the years leading up to now, I have seen multiple solutions created, startups enter the industry, big companies try to bring their solutions to the cloud, and a lot of them failed to achieve their stated capabilities. Not only was the technology not ready, but also companies were not generally interested. There was a rare situation in which business demand and technology solutions have developed in parallel.</p>
<p>It is still true that companies will need to adopt a set of standard capabilities per the 80/20 rule. Fortunately, the number and flexibility of those standard capabilities has become robust among the market leaders. Product vendors see this trend, and the product investment funding is clearly becoming cloud first.</p>
<p>It’s important to note that some cloud-based IAM vendors have a focus area. Few cover all aspects of IAM — and therefore have some limitations. This is where it’s really important to understand the four subdomains of IAM: identity data; identity management; access governance; and access enforcement. Some vendors focus on federation and authentication. Some are great at directory replication within a homogeneous platform. Some specialize in provisioning and deprovisioning.</p>
<p>Administration interfaces — those complex, fat-client or command-line tools so common with on-premises solutions — are now replaced with dynamic and intuitive web-based tools in <a href="https://www.ibm.com/us-en/marketplace/cloud-identity-connect?ce=ISM0484&amp;ct=SWG&amp;cmp=IBMSocial&amp;cm=h&amp;cr=Security&amp;ccy=US" target="_blank" rel="noopener noreferrer">cloud-based IAM solutions</a>. They have point-and-click configurations and wizards. They allow almost all aspects of administration to be conducted by customer administrator users.</p>
<p>Just as important as the use cases available is the integration capabilities. On-premises IAM solutions have the advantages of installed connectors, a broad range of network protocols, custom code capabilities and nearly unlimited bandwidth. The leading cloud-based IAM vendors are addressing this too by adopting dedicated network connectivity to go beyond the LDAPS/ JDBC protocols, and leveraging application programming interfaces (APIs) for integration. Software-as-a-service (SaaS) operational services have also expanded so features that aren’t yet administered by web-based tools can be configured with a change request ticket to the SaaS operations team.</p>
<p>Perhaps the most important reasons to adopt cloud-based IAM solutions are stability, flexible capacity and operational cost reductions. These are no longer considered differentiators between SaaS vendors; they are often more stable than on-premises solutions and certainly more expandable. The cost advantage still needs to be evaluated on a company-by-company basis, and many factors affect that calculation. But in my experience, I have yet to see a cloud-based IAM solution cost more to implement or operate than a comparable on-premises solution.</p>
<h3>Opportunity for Security</h3>
<p>Adopting a cloud-based IAM solution is not something to be taken lightly, especially if there are significant investments in on-premises licenses, infrastructure and operations. If these investments exist, the next upgrade or expansion cycle is the time to look at moving to cloud-based IAM. Doing so makes it possible to adopt standardized solutions, simplify operations and reduce operational cost, all while using the leading-edge technology.</p>
<h2>4. Regulatory Compliance and Audit Enablement Is No Longer a Burning Platform</h2>
<p>With the current level of IAM maturity, most companies have reached an equilibrium of automated IAM technology and manual processes for audit and regulatory compliance. The pendulum has certainly swung back and forth over the past 15 years, and a lot of work has been done to get here. Now, the demand for technology and process changes have declined. This isn’t to say the work is complete or that everyone is happy — I doubt any company would say they have the optimal solution.</p>
<p>Most companies have either reached a point of diminishing returns on their investments toward audit and regulatory compliance needs, or they simply have no funding available. A few companies are pulling back from their complex RBAC models and automated separate of duties (SoD) policies because they have realized the cost and complexity of maintaining them. Others have found manual processes are sufficient for audit purposes and less expensive — especially when using offshore teams — than integrating to the nth level with technology.</p>
<p>Still, other companies have IAM shelfware. They bought solutions and are paying for annual maintenance, but the cost to implement, integrate and operate are too expensive in the current business environment. There is a fundamental truth that IAM affects almost every area of IT and most back-office business processes. This makes a comprehensive deployment expensive and time-consuming. And in spite of the move toward cloud-based IAM, that fundamental truth hasn’t changed.</p>
<p>The big caveat to this is the <a href="https://securityintelligence.com/embracing-the-gdpr-as-a-catalyst-for-innovation/" target="_blank" rel="noopener noreferrer">General Data Protection Regulation (GDPR)</a>. While few companies are taking action at the moment, and it’s not perfectly clear what the IAM implications are, it’s clear we will all need to look at how we enable users to manage their identity data under this regulation. I expect this to be a significantly different situation in six months to a year!</p>
<h3>Opportunity for Security</h3>
<p>While SOX, HIPPA, GLBA and other regulatory programs are not disappearing (perhaps changing, but not being eliminated), they are no longer a leading driver of funding to IAM programs. This is not to say no one is asking or new regulations aren’t coming. In fact, internal audit teams and application owners are still burdened with onerous access recertification processes. Further, other demand is backfilling for that drop in demand, so we still see an upward trend in IAM investment. CISOs can still rely on internal audit and business unit stakeholders to advocate and help with funding for IAM initiatives by building a coalition.</p>
<h2>5. The Explosion of Federation</h2>
<p>Federation and federated single sign-on (SSO) is now the standard mechanism to provide SSO across application domains. It’s practically a necessity to connect with SaaS providers. This has been the case for a number of years, and federation was one of the most rapidly adopted standards. But it has recently reached a new threshold: It is becoming the default authentication mechanism within companies and across applications. This is due to a number of factors, such as the proliferation and maturity of SSO tools, native support for SAML within large software packages and the adoption of SaaS applications.</p>
<p>It’s also important to remember that federation partnerships have become a very simple configuration to add. In most SSO tools, they can be added in a few minutes via a wizard-like interface. With this small investment and a little testing, these connections can be added and changed easily. There are even some companies that allow business users to manage federations for their applications without security team participation. The close relatives of federation, <a href="https://securityintelligence.com/about-oauth-use-for-api-authorization/" target="_blank" rel="noopener noreferrer">OAuth</a> and social media-based authentication are gaining acceptance as well, but they are not yet at the same critical mass.</p>
<p>For many companies, the sheer number and criticality of federation partnerships have become unwieldy. Five years ago, a company might have had two or four federation partnerships. But today it can be in the hundreds, with copies of the same partnership on the same endpoint system, used by different business units. Managing hundreds of configurations can be challenging, so I have been coaching companies to treat federation partnerships with the same diligence and change management control as their other mission-critical systems.</p>
<h3>Opportunity for Security</h3>
<p>When a technology reaches this level of adoption and maturity, it’s an opportunity to eliminate older technologies, mandate federation as the SSO standard for technology deployments and codify the change control process for SSO integrations. If a security team can achieve these things, they are well-positioned to leverage offshore or outsourced resources to manage these configurations. This allows the core security team to refocus on more pressing and complex issues.</p>
<p>While many changes in the security domain make our lives more difficult, the changing IAM landscape continues to improve business outcomes, improve the user experience and increase operational efficiency.</p>
<p>&nbsp;</p>
<h5>Source: <a href="https://securityintelligence.com/current-trends-in-identity-and-access-management-july-2017/" target="_blank" rel="noopener">securityintelligence.com</a><br />
Author: Brett Valentine, Associate Partner, IBM</h5>
<p>The post <a href="https://identityinsider.org/current-trends-in-identity-and-access-management-july-2017/">Current Trends in Identity and Access Management: July 2017</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6062</post-id>	</item>
		<item>
		<title>Say Goodbye to Passwords, the Future of Authentication is Here</title>
		<link>https://identityinsider.org/say-goodbye-to-passwords-the-future-of-authentication-is-here/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Fri, 07 Sep 2018 10:02:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6048</guid>

					<description><![CDATA[<p>The post <a href="https://identityinsider.org/say-goodbye-to-passwords-the-future-of-authentication-is-here/">Say Goodbye to Passwords, the Future of Authentication is Here</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69d9a0496db65"  data-midnight="dark" data-bg-mobile-hidden="" class="wpb_row vc_row-fluid vc_row standard_section   "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap"><div class="inner-wrap"> <div class="row-bg    "  style="" data-color_overlay="" data-color_overlay_2="" data-gradient_direction="" data-overlay_strength="0.3" data-enable_gradient="false"></div></div> </div><div class="col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding"  data-border-radius="none" data-shadow="none" data-border-animation="" data-border-animation-delay="" data-border-width="none" data-border-style="solid" data-border-color="" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0">
		<div class="vc_column-inner">
			<div class="wpb_wrapper">
				
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>It has been clear for a while now that passwords no longer provide the user experience or security needed for consumers today. Take the fact that a few months ago, health and fitness app MyFitnessPal, was the latest brand to hit the headlines, as cyber thieves made off with the encrypted passwords of around 150 million users.</p>
<p>This type of news simply serves as a reminder that an alternative to passwords is no longer just desirable, but necessary. The answer is zero login: a technology that is about to redefine authentication forever.</p>
<p>While the majority of us are familiar with fingerprint or facial recognition methods, the latest advances in authentication will see our most intricate behavioral characteristics – such as typing patterns, location and occupation – used to verify our identity and protect our personal information. These new technologies will allow you to log you into your applications without you needing to do anything at all.</p>
<p><strong>Zero login today</strong><br />
It may surprise you to learn that zero login is already in action today. If you’ve logged into your online banking from a new device or connected from a cafe that you’ve never been to before, you may have received a message or call from your bank asking you to verify your email or phone number to prove it’s really you. These technologies have been deployed for a number of years and may have signaled the beginning of the authentication revolution we are seeing today.</p>
<p>Amazon.com is currently testing behaviorial characteristics, including the pressure applied when a user taps their phone and typing speed as vectors for verifying a user’s identity. Such intricate and unique patterns are extremely difficult for a potential attacker to guess or replicate and not one uses a password.</p>
<p>Recent models of iPhone already allow the user to change the pressure of their home button, also holding the ability to detect and remember signals from other devices such as your car, Fitbit or headphones. While an attacker may be able to trick one of these technologies, fooling them all simultaneously would be extremely tough.</p>
<p>A zero login world would see passwords as the final level of security and only attackers should ever be asked to enter one. Today, many applications and online stores will ask for a password even though the chance of that transaction being fraudulent are extremely low.</p>
<p>Many people second-guess their purchases when met with a password request and removing such a barrier, while maintaining and even improving the level of security, would be advantageous to both consumers and retailers alike.</p>
<p><strong>The ugly side</strong><br />
While zero login comes with an obvious number of benefits, it also brings to mind a variety of potential limitations. How do you know when you have successfully logged out? How well is all of this behavioral data being protected? Perhaps more worryingly, how do you know when you are being monitored without your knowledge?</p>
<p>If your phone is collecting all of this information about you, how is it being protected and where is it being sent? Allowing your device to run background software that can calculate a ‘risk score’ based on the interactions of the user with the phone is a positive example of how this innovation can be used, as the score would then be sent to the cloud where a decision would be made on the likelihood of infiltration.</p>
<p>However, an inherent level of discomfort comes with knowing your biometrics and location are being sent and stored across the internet. While some of us demand complete privacy, we still want to keep some parts of our lives separate and even if this information is encrypted there is still a chance this information can be seized by attackers.</p>
<p>Understandably, there are considerable implications if users are logged into a service without realizing it and with passive authentication, we can easily be logged into all of our accounts, all of the time, without even realizing it.</p>
<p>Authentication is about to be redefined as we know it. The thought of remembering numerous complex passwords will soon fall under the umbrella of ‘the old fashioned way’ and our phones will soon be able to recognize us from the moment we pick up the device.</p>
<p>Perfecting zero login to ensure it is secure, frictionless and personalized is just around the corner but to combat its potential limitations and to ensure a successful transition from passwords will see the need for effective regulations to be enforced. The technology is smart but people’s privacy and consent must be prioritized if we are to successfully construct the new era of authentication.</p>
<p>Source Link: <a href="https://www.infosecurity-magazine.com/opinions/goodbye-passwords-authentication/" target="_blank" rel="noopener">https://www.infosecurity-magazine.com/opinions/goodbye-passwords-authentication/</a><br />
Author: Sarah Squire</p>

		</div>
	</div>

			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://identityinsider.org/say-goodbye-to-passwords-the-future-of-authentication-is-here/">Say Goodbye to Passwords, the Future of Authentication is Here</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6048</post-id>	</item>
		<item>
		<title>4 Benefits of a World with Less Privacy</title>
		<link>https://identityinsider.org/4-benefits-of-a-world-with-less-privacy/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Fri, 07 Sep 2018 09:36:39 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6042</guid>

					<description><![CDATA[<p>The post <a href="https://identityinsider.org/4-benefits-of-a-world-with-less-privacy/">4 Benefits of a World with Less Privacy</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69d9a0496e94c"  data-midnight="dark" data-bg-mobile-hidden="" class="wpb_row vc_row-fluid vc_row standard_section   "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap"><div class="inner-wrap"> <div class="row-bg    "  style="" data-color_overlay="" data-color_overlay_2="" data-gradient_direction="" data-overlay_strength="0.3" data-enable_gradient="false"></div></div> </div><div class="col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding"  data-border-radius="none" data-shadow="none" data-border-animation="" data-border-animation-delay="" data-border-width="none" data-border-style="solid" data-border-color="" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0">
		<div class="vc_column-inner">
			<div class="wpb_wrapper">
				
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>The privacy issue is a problem for a lot of people. I see it differently.</strong><br />
I recently joined the Delete Facebook movement, but not because I thought removing my account would restore my online privacy.</p>
<p>I was ready to move on.</p>
<p>The truth is, the Internet knows the same about me today as it did when I was a member of the world&#8217;s largest social network. Whether or not I deleted my account is irrelevant to the state of my online privacy. There will still be a &#8220;Reg Harnish&#8221; shadow profile on the platform with thousands of pages of data. My profile will continue to grow as long as my friends and family continue to post photos and information about me — and as long as Facebook follows its practice of monitoring user behavior across the Internet via partner sites and ads.</p>
<p>My digital footprint isn&#8217;t going anywhere. That is, unless I decide to drop off the grid for the rest of my life; but, even then, my information still would be available, just buried beneath a sea of data.</p>
<p>The privacy issue is a problem for a lot of people. I see it differently. In fact, I believe society could benefit from a little less privacy. I&#8217;m certainly not advocating for the death of privacy. I tend to side with those who argue that privacy is an intrinsic value that shouldn&#8217;t be treated as a dispensable commodity. It is essential for self-development and, without some level of privacy, we would all lose our individuality and conform to one another.</p>
<p>With that said, here are four benefits of a world with less privacy:</p>
<p>Convenience: For the past 3,000 years, cultures commonly prioritized convenience and wealth over privacy. Internal walls in homes didn&#8217;t exist until 1500 A.D., with the development of the brick chimney, which needed support beams that ultimately segmented the home&#8217;s interior space. Before the 1700s, most homes had only one bed because they were too expensive to build.</p>
<p>Even today, just about every American has already unwittingly opted out of privacy for the convenience of surfing the web, monitoring their physical activity with fitness trackers, or receiving digital discounts at the grocery store, among many other online activities.</p>
<p>By devoting so much of our time online or opting in to terms and conditions, we have allowed third-parties not only to create digital copies of ourselves but also to predict our behaviors before we, ourselves, even know how we will behave. Taken to the next level, we could experience a new degree of convenience that rivals some of the best sci-fi films ever created. Already we are experiencing a degree of high-tech convenience that our forefathers could scarcely have imagined. Plus, with the recent push toward artificial intelligence and machine learning, computers may learn to guide us toward better decisions for our health, relationships, and lifestyles.</p>
<p>Reduced cybercrime: The simple fact that we place value on our privacy makes it worth stealing. For instance, Social Security numbers (SSNs) were never meant to be more than a way for tracking the earnings histories of workers in the US. Nowadays, you can&#8217;t do anything without providing that number for verification. What was once a worthless nine-digit number now can be used to open a bank account in someone else&#8217;s name, receive their benefits, and ultimately steal their identity.</p>
<p>The minute we stop using our SSNs as a form of ID, criminals would no longer be interested in stealing that information because it would be worthless. The same goes for all information. Of course, some degree of privacy is essential for maintaining national security and financial stability. But that doesn&#8217;t mean we should be assigning false value to outdated forms of identification. Just like our SSNs, if other information such as corporate databases, National Security Agency (NSA) records, and the security cameras that monitor our city streets were made public, criminals would be less likely to steal it because that information would be worthless on the market.</p>
<p>Live longer: Tailored advertisements and discounts showing up on your social feeds are just a couple of the many benefits of sharing personal information. Pulling back the curtain of privacy could save lives, too. Right now, our medical data is protected by the Health Insurance Portability and Accountability Act (HIPAA), but many people don&#8217;t realize that their health data could be the missing link preventing the next big breakthrough in medicine. If we shared our medical data freely, imagine the amount of data that medical providers, entrepreneurs, and companies could harness in the name of research. New medical treatments and cures would be discovered, perhaps, at unprecedented rates, not only saving lives but allowing humans to live longer.</p>
<p>Take the deadly drug Vioxx, for example. Researchers reported in a 2013 Iowa Law Review article that if patients who took the deadly drug had shared their health information publicly, statistics could have detected the side effects much earlier, possibly saving as many as 25,000 lives.</p>
<p>Source Link: <a href="https://www.darkreading.com/endpoint/4-benefits-of-a-world-with-less-privacy/a/d-id/1332690" target="_blank" rel="noopener">https://www.darkreading.com/endpoint/4-benefits-of-a-world-with-less-privacy/a/d-id/1332690</a><br />
Author: Reg Harnish</p>

		</div>
	</div>

			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://identityinsider.org/4-benefits-of-a-world-with-less-privacy/">4 Benefits of a World with Less Privacy</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6042</post-id>	</item>
		<item>
		<title>Unprotected MongoDB Account Exposes 200K Files</title>
		<link>https://identityinsider.org/unprotected-mongodb-account-exposes-200k-files/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Fri, 07 Sep 2018 06:27:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[MongoDB]]></category>
		<category><![CDATA[MongoDB Account Exposes]]></category>
		<category><![CDATA[MongoDB Account Exposes 200K Files]]></category>
		<category><![CDATA[protected MongoDB Account]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6045</guid>

					<description><![CDATA[<p>A security researcher has discovered...</p>
<p>The post <a href="https://identityinsider.org/unprotected-mongodb-account-exposes-200k-files/">Unprotected MongoDB Account Exposes 200K Files</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A security researcher has discovered yet another misconfigured MongoDB installation online, this time exposing over 200,000 highly sensitive corporate documents.</p>
<p>The 142GB MongoDB account was hosted on Amazon Web Services (AWS) infrastructure in the US and belonged to global document recognition and content capture software developer ABBYY, according to former Kromtech man Bob Diachenko.</p>
<p>Unfortunately, the account was left totally unprotected, with no password or log-in, meaning anyone with internet access could theoretically have gained entry.</p>
<p>“The biggest concern was the fact MongoDB in question also contained a large chunk of scanned documents (more than 200,000 contracts, NDAs, memos, letters and other internal documentation, properly OCR&#8217;d and stored) which apparently were stored by ABBYY partners using their administration console,” he explained.</p>
<p>The firm’s head of information security replied to Diachenko’s email requesting more info.</p>
<p>“Database access has been disabled soon after I sent him the IP address (two days after my initial notification), but questions still remain as of how long it has been left without password/login, who else got access to it and would they notify their customers on the incident,” <a href="https://www.linkedin.com/pulse/abbyy-exposed-its-document-storage-database-more-than-bob-diachenko/" target="_blank" rel="noopener">he added</a>.</p>
<p>A statement sent to the researcher following the incident claimed the “temporary data breach” affected just one of the developer’s customers, and that a “full corrective security review of our infrastructure, processes and procedures” has been undertaken.</p>
<p>ABBYY lists major global companies and governments among its customer base, including Deloitte, McDonald’s, Volkswagen and the Reserve Bank of Australia.</p>
<p>The firm is fortunate Diachenko found the trove of documents rather than online attackers who last year twice ran major campaigns in which data was stolen from exposed servers before <a href="https://www.infosecurity-magazine.com/news/mongodb-installations-held-to/" target="_blank" rel="noopener">being ransomed</a>. It’s believed tens of thousands of victims were involved.</p>
<p>&nbsp;</p>
<h4>Source: <a href="https://www.infosecurity-magazine.com/">www.infosecurity-magazine.com</a><br />
Author: <a href="https://www.infosecurity-magazine.com/profile/phil-muncaster/" rel="author">Phil Muncaster</a><span class="author-title"> UK / EMEA News Reporter , Infosecurity Magazine</span></h4>
<p>The post <a href="https://identityinsider.org/unprotected-mongodb-account-exposes-200k-files/">Unprotected MongoDB Account Exposes 200K Files</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6045</post-id>	</item>
		<item>
		<title>Adding ‘I Am’ to IAM</title>
		<link>https://identityinsider.org/adding-i-am-to-iam/</link>
		
		<dc:creator><![CDATA[Nitaant Singh]]></dc:creator>
		<pubDate>Tue, 04 Sep 2018 12:17:18 +0000</pubDate>
				<category><![CDATA[IAM]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6035</guid>

					<description><![CDATA[<p>The post <a href="https://identityinsider.org/adding-i-am-to-iam/">Adding ‘I Am’ to IAM</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69d9a0496f3a2"  data-midnight="dark" data-bg-mobile-hidden="" class="wpb_row vc_row-fluid vc_row standard_section   "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap"><div class="inner-wrap"> <div class="row-bg    "  style="" data-color_overlay="" data-color_overlay_2="" data-gradient_direction="" data-overlay_strength="0.3" data-enable_gradient="false"></div></div> </div><div class="col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding"  data-border-radius="none" data-shadow="none" data-border-animation="" data-border-animation-delay="" data-border-width="none" data-border-style="solid" data-border-color="" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0">
		<div class="vc_column-inner">
			<div class="wpb_wrapper">
				
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>The presumption of innocence states that the onus on proving guilt belongs to the accuser and not to the defender. However, Cybersecurity in the past decade, and Identity and Access Management (IAM) in specific, has been more aligned, In principle, with feudal law.</p>
<p>Most users are innocent. They have a right to say “I am. I exist. I have a right to freedom and not to be constantly suspected of harming society.” IAM systems today make them feel the opposite – that “I am NOT. Only hackers are. I must somehow exist within this criminal networking universe.”</p>
<p>The architecture behind most IAM systems is based on proving a user’s innocence. It is becoming increasingly challenging to prove that you are an authorized person with policies such as multifactor authentication.</p>
<p>The user experience at the front end is no different. What with captchas and frustrating user-lockouts when incorrect credentials are entered, despite ~98% of human customers being legitimate and low fraud-risk, most people are put behind metaphorical bars for crimes they have never committed.</p>
<p>And trust is a two-way street. How can you expect your customers to trust you (and more importantly, end users to trust and adopt your SSO solution), if you show no trust in them?</p>
<p>Users must be given the benefit of the doubt. They must be allowed freedom within their networks.</p>
<p>Ronald Reagan said it best. He said, “trust but verify”. This is the direction that IAM architecture and user experience needs to flow in. At the moment, the IAM landscape operates not even in verification mode but in an outright ‘prove-your-innocence’ model.</p>
<p>According to industry analyst ‘Gartner’, “by 2022, digital businesses with great customer experience during identity corroboration will earn 20% more revenue than comparable businesses with poor customer experience.” This is because in our evolving, networked world, customer experience is becoming one of the single most important reasons to buy from a business. Competition is perpetually increasing, innovation is cut-throat and always cutting edge, and people actively educate themselves before making purchases.</p>
<p>And user experience is exponentially more important in products such as Single Sign-On and Password Management which are targeted at businesses. A poor user experience results in low adoption of the solution (Read: <strong><a href="http://identityinsider.org/combating-low-employee-adoption-of-iam-solutions/" target="_blank" rel="noopener">Combating Low User Adoption</a></strong>).</p>
<p>IAM vendors need to change their mindset and play a different game.</p>
<p>Instead of just jailing customers out of their apps until they prove that they are worthy of access, they must use their own intelligence in the form of computer learning, behavioral analytics, etc.</p>
<p>In 2017, Gartner suggested a good framework for building IAM systems that treat customers fairly:<br />
1. Identify Signs of Legitimate Behavior (Good Customers)<br />
2. Identify Evolving Attack Methods and Patterns (Criminals)<br />
3. Apply Intelligent, Context-Based Adaptive Access to Customer Interactions</p>
<p>A technology that is solving the issue in terms of architecture is Adaptive Authentication. Already available from many vendors, it revolves around using intelligence to differentiate between genuine and fraudulent access attempts <strong>(</strong><strong>Read:</strong><a href="http://identityinsider.org/adaptive-authentication-the-hackers-waterloo/" target="_blank" rel="noopener"><strong>Adaptive Authentication: The Hacker’s Waterloo</strong></a><strong>)</strong>.</p>
<p>However, it is the basic attitude behind our attempts to protect users that needs to change. Hacking makes headlines, but in terms of statistics is a low-priority use of the internet. We must assess the reality of security risks and design our solutions accordingly. Simply building as many walls as possible is not the answer – we must create intelligent, responsive gateways if we want IAM adoption to grow.</p>

		</div>
	</div>

			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://identityinsider.org/adding-i-am-to-iam/">Adding ‘I Am’ to IAM</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6035</post-id>	</item>
		<item>
		<title>The IoT&#8217;s Perplexing Security Problems</title>
		<link>https://identityinsider.org/the-iots-perplexing-security-problems/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Tue, 04 Sep 2018 11:51:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6027</guid>

					<description><![CDATA[<p>The post <a href="https://identityinsider.org/the-iots-perplexing-security-problems/">The IoT&#8217;s Perplexing Security Problems</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69d9a0496f9b1"  data-midnight="dark" data-bg-mobile-hidden="" class="wpb_row vc_row-fluid vc_row standard_section   "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap"><div class="inner-wrap"> <div class="row-bg    "  style="" data-color_overlay="" data-color_overlay_2="" data-gradient_direction="" data-overlay_strength="0.3" data-enable_gradient="false"></div></div> </div><div class="col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding"  data-border-radius="none" data-shadow="none" data-border-animation="" data-border-animation-delay="" data-border-width="none" data-border-style="solid" data-border-color="" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0">
		<div class="vc_column-inner">
			<div class="wpb_wrapper">
				
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p class="story-body">There&#8217;s a lot of hype around artificial intelligence as the greatest thing since sliced bread, but will AI really help with cybersecurity? Criminals who run cybercriminal businesses also are capable of using the AI to commit crimes. It&#8217;s logical that if one person is smart enough to develop cyberprotection technologies that utilize AI, then thoughtful, creative criminals can use AI to penetrate those AI-created protections.</p>
<p>AI has been around since about 1959. It has had its ups and downs until 2011, when IBM&#8217;s Watson became a television celebrity by <a href="https://www.techrepublic.com/article/ibm-watson-the-inside-story-of-how-the-jeopardy-winning-supercomputer-was-born-and-what-it-wants-to-do-next/" target="_blank" rel="noopener">beating <em>Jeopardy!</em>&#8216;s reigning champs</a>.</p>
<p>Now IBM regularly has television commercials promoting Watson for myriad uses, including detecting problems with aircraft and elevators. At the same time, these ads make AI appear commonplace and part of our current culture, rather than as some esoteric complex computer technology.</p>
<h2 class="subhead">AI in Cybersecurity</h2>
<p>It is important to understand what machine learning is and how it relates to AI. To oversimplify, machine learning is a computer&#8217;s ability to recognize things. Artificial intelligence is a computer&#8217;s ability to mimic human understanding.</p>
<p>However with all the marketing hype found on the Internet, it is oftentimes difficult to understand when someone really is referring to AI or machine learning.</p>
<p>&#8220;I actually don&#8217;t think a lot of these companies are using artificial intelligence,&#8221; <a class="story-keyword-offsite" href="http://www.malwarebytes.org/">Malwarebytes</a> CEO Marcin Kleczynski <a href="https://www.wired.com/story/ai-machine-learning-cybersecurity/" target="_blank" rel="noopener">told <em>Wired</em></a>. &#8220;It&#8217;s really training machine learning. It&#8217;s misleading in some ways to call it AI, and it confuses the hell out of customers.&#8221;</p>
<p>Malwarebytes is a provider of machine learning threat detection software.</p>
<p>Machine learning can be very beneficial in the deployment of cybersecurity detection systems, as it enables devices to learn what to watch for.</p>
<h4>Source: www.technewsworld.com</h4>

		</div>
	</div>

			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://identityinsider.org/the-iots-perplexing-security-problems/">The IoT&#8217;s Perplexing Security Problems</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6027</post-id>	</item>
		<item>
		<title>Don&#8217;t Be So Sure AI Is Cybersecurity&#8217;s Silver Bullet</title>
		<link>https://identityinsider.org/dont-be-so-sure-ai-is-cybersecuritys-silver-bullet/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Tue, 04 Sep 2018 06:18:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6023</guid>

					<description><![CDATA[<p>The post <a href="https://identityinsider.org/dont-be-so-sure-ai-is-cybersecuritys-silver-bullet/">Don&#8217;t Be So Sure AI Is Cybersecurity&#8217;s Silver Bullet</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69d9a0496ff44"  data-midnight="dark" data-bg-mobile-hidden="" class="wpb_row vc_row-fluid vc_row standard_section   "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap"><div class="inner-wrap"> <div class="row-bg    "  style="" data-color_overlay="" data-color_overlay_2="" data-gradient_direction="" data-overlay_strength="0.3" data-enable_gradient="false"></div></div> </div><div class="col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding"  data-border-radius="none" data-shadow="none" data-border-animation="" data-border-animation-delay="" data-border-width="none" data-border-style="solid" data-border-color="" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0">
		<div class="vc_column-inner">
			<div class="wpb_wrapper">
				
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p class="story-body">There&#8217;s a lot of hype around artificial intelligence as the greatest thing since sliced bread, but will AI really help with cybersecurity? Criminals who run cybercriminal businesses also are capable of using the AI to commit crimes. It&#8217;s logical that if one person is smart enough to develop cyberprotection technologies that utilize AI, then thoughtful, creative criminals can use AI to penetrate those AI-created protections.</p>
<p>AI has been around since about 1959. It has had its ups and downs until 2011, when IBM&#8217;s Watson became a television celebrity by <a href="https://www.techrepublic.com/article/ibm-watson-the-inside-story-of-how-the-jeopardy-winning-supercomputer-was-born-and-what-it-wants-to-do-next/" target="_blank" rel="noopener">beating <em>Jeopardy!</em>&#8216;s reigning champs</a>.</p>
<p>Now IBM regularly has television commercials promoting Watson for myriad uses, including detecting problems with aircraft and elevators. At the same time, these ads make AI appear commonplace and part of our current culture, rather than as some esoteric complex computer technology.</p>
<h2 class="subhead">AI in Cybersecurity</h2>
<p>It is important to understand what machine learning is and how it relates to AI. To oversimplify, machine learning is a computer&#8217;s ability to recognize things. Artificial intelligence is a computer&#8217;s ability to mimic human understanding.</p>
<p>However with all the marketing hype found on the Internet, it is oftentimes difficult to understand when someone really is referring to AI or machine learning.</p>
<p>&#8220;I actually don&#8217;t think a lot of these companies are using artificial intelligence,&#8221; <a class="story-keyword-offsite" href="http://www.malwarebytes.org/">Malwarebytes</a> CEO Marcin Kleczynski <a href="https://www.wired.com/story/ai-machine-learning-cybersecurity/" target="_blank" rel="noopener">told <em>Wired</em></a>. &#8220;It&#8217;s really training machine learning. It&#8217;s misleading in some ways to call it AI, and it confuses the hell out of customers.&#8221;</p>
<p>Malwarebytes is a provider of machine learning threat detection software.</p>
<p>Machine learning can be very beneficial in the deployment of cybersecurity detection systems, as it enables devices to learn what to watch for.</p>

		</div>
	</div>

			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://identityinsider.org/dont-be-so-sure-ai-is-cybersecuritys-silver-bullet/">Don&#8217;t Be So Sure AI Is Cybersecurity&#8217;s Silver Bullet</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6023</post-id>	</item>
		<item>
		<title>261,000 cryptocurrency investor details leaked in Atlas Quantum hack</title>
		<link>https://identityinsider.org/261000-cryptocurrency-investor-details-leaked-in-atlas-quantum-hack/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Tue, 04 Sep 2018 06:09:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://identityinsider.org/?p=6018</guid>

					<description><![CDATA[<p>The post <a href="https://identityinsider.org/261000-cryptocurrency-investor-details-leaked-in-atlas-quantum-hack/">261,000 cryptocurrency investor details leaked in Atlas Quantum hack</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69d9a0497049d"  data-midnight="dark" data-bg-mobile-hidden="" class="wpb_row vc_row-fluid vc_row standard_section   "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap"><div class="inner-wrap"> <div class="row-bg    "  style="" data-color_overlay="" data-color_overlay_2="" data-gradient_direction="" data-overlay_strength="0.3" data-enable_gradient="false"></div></div> </div><div class="col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding"  data-border-radius="none" data-shadow="none" data-border-animation="" data-border-animation-delay="" data-border-width="none" data-border-style="solid" data-border-color="" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0">
		<div class="vc_column-inner">
			<div class="wpb_wrapper">
				
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>A major hack hits investment platform Atlas Quantum, with over a quarter of a million customer records compromised…</strong><span id="more-5111"></span></p>
<p>A treasure trove of hundreds of thousands of email addresses, account balances, names and phone numbers of cryptocurrency investors has been stolen after Brazilian investment platform Atlas Quantum suffered a large scale hack.</p>
<p>Atlas Quantum is a crypto trading platform that cl aims to offer automated arbitrage based on real-time movements in cryptocurrency markets. The company says it has over 240,000 customers in more than 50 countries, and more than $30 million in assets under management.</p>
<p>Personally identifiable data from 261,463 investors was stolen, according to security researcher Troy Hunt, who first publicised the leak.</p>
<p>Hunt runs HaveIBeenPwned.com, a free access database where members of the public can search their own email addresses to see if they have been compromised or otherwise unlawfully shared online.</p>
<p>In a statement posted on Facebook on Sunday, Atlas Quantum CEO Rodrigo Marquez admitted that his company’s systems had failed to stop the breach and that customer details had been exposed.</p>
<p>Some of the platform’s features have been disabled, said Marquez, while teams investigate the leak.</p>
<p>“We became aware early on Saturday night that a security incident involving the leakage of data from our customers occurred.</p>
<p>“We are monitoring the affected accounts and working to have additional protection against fraud.”</p>
<p>Marquez insisted that no cryptocurrencies had been stolen from exchanges or custody wallets for any of the 261,000 affected accounts.</p>
<p>“At the time of the incident we took immediate steps to protect the database and passwords and private keys remain encrypted,” he added.</p>
<p>The Atlas Quantum hack represents yet another large-scale data breach from major cryptocurrency platforms worldwide.</p>
<p>According to security thinktank the Igarape Institute, Brazil is in the grip of a cybercrime problem which is only getting worse.</p>
<p>The country ranks second in the world in online banking fraud and financial malware, while the number of cyberattacks increased 197 percent in 2014, with data theft accounting for around $4 billion in losses every year.</p>
<h4>Source: <a href="https://cryptonewsreview.com/" target="_blank" rel="noopener">www.cryptonewsreview.com</a><br />
Author: Tom Rodgers</h4>

		</div>
	</div>

			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://identityinsider.org/261000-cryptocurrency-investor-details-leaked-in-atlas-quantum-hack/">261,000 cryptocurrency investor details leaked in Atlas Quantum hack</a> appeared first on <a href="https://identityinsider.org">Identity Insider</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6018</post-id>	</item>
	</channel>
</rss>
