Monday, July 16, 2007

Identity mix-ups and the potential harm to your reputation

Network World

Identity Management




Network World's Identity Management Newsletter, 07/16/07

Identity mix-ups and the potential harm to your reputation

By Dave Kearns

Pamela Dingle, from Calgary’s Nulli Secundis, is known as one of the world’s foremost advocates of Microsoft CardSpace as well as being a driving force behind integration of the major user-centric identity systems (CardSpace, OpenID, the Bandit Project, etc.) through her “PamelaWare” alter ego. In her spare time, she blogs on identity issues and other aspects of life on a blog dubbed “Adventures of an Eternal Optimist.” Her optimism was challenged recently.

If you keep, or just read, blogs you’ll know that folks can’t keep up with the proliferation of Web sites they would need to visit to read them all. Syndication via the RSS or ATOM protocols solves that problem by allowing a desktop or Web-based tool to collect new postings and present them to you – following a “publish and subscribe” model. (If you aren’t familiar with RSS, go here for an explanation and some links to tools.)

Recently, the organization that provides the RSS subscription feed for Pamela’s blog had a hiccup and started sending out someone else’s blog postings under Pamela’s name. Imagine getting the “DAVE KEARNS ON IDENTITY MANAGEMENT” newsletter in your inbox, but having the content come from Jeff Caruso’s “LANs & Routers” newsletter. Jeff’s a nice guy, but his content isn’t very closely related to identity management!

The Security Standard - The Only Executive Summit Focused on the Business, Management and Strategic Aspects of Security

September 10-11, 2007 | The Fairmont Hotel Chicago
How do your security initiatives support company business goals? The answer to this question can make all the difference in gaining the corporate-wide support and resources you need to drive your security strategies. Uncover best practices and organizational strategies for achieving success by attending The Security Standard Conference. Click here for more details. Click here for more details

Still, the “LANs & Routers” news would be fairly innocuous, I imagine. What happened to Dingle was a bit more embarrassing – under the heading “Help! My two year old is a screaming monster!” was a stream of consciousness rant about psychotherapeutic drug use which gave the impression that Pamela was BWI (not the Baltimore airport, but Blogging While Intoxicated)!

Reputation is a big part of anyone’s identity, and reputation – at least digital reputation – is, in large part, built upon what someone writes online. Had not she quickly discovered the problem, it’s quite possible that reputational damage could have been done. But worse, as she noted: “What if this wasn’t my personal blog affected. What if this was, instead, my corporate ERP system affected? Or my corporate e-mail system? What happens when a hosting company mixes up the account identifiers of two different companies’ financial accounts? What could the possible cost be, in both reputation and income, of your company’s confidential data being temporarily disclosed to another company’s users? Or of your company’s identity being temporarily associated with somebody else’s confidential data?”

It isn’t just identity theft, or identity fraud, that you need to worry about, but lost, strayed, or misplaced identity too. Who’s watching your reputation?

Upcoming Event: M-Tech CTO Idan Shoham will deliver a 45-minute Webinar on ‘Quick Wins in Identity Management’ sponsored by the Oxford Computer Group on Wednesday, July 25, 2007 at 10 a.m. MDT (noon EDT, 9 a.m. PDT). Learn how to get value early and often from your identity management initiative; how to manage risks in projects by dealing with long timelines, user impacts and multiple stakeholders; and how your organization can capitalize on quick wins to propel your project to success in addition to discovering what a typical timeline should look like. Sign up today!


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Workaround puts Skype on iPhone
2. Spam filter costs lawyers their day in court
3. As image spam declines, PDF spam rises
4. Cisco IP telephony software open to DoS attacks
5. Google Earth captures China's new ballistic-missile sub
6. iPhone not business-ready? CRM released anyway
7. Gloves come off in antivirus dispute
8. IT jobs get hot as baby boomers retire
9. Critics bash Massachusetts on Open XML proposal
10. The $2.3 million home lab

MOST DOWNLOADED PODCAST:
Twisted Pair: I phone, you phone, we all groan at the iPhone


Contact the author:

Dave Kearns is a writer and consultant in Silicon Valley. He's written a number of books including the (sadly) now out of print "Peter Norton's Complete Guide to Networks." His musings can be found at Virtual Quill.

Kearns is the author of two Network World Newsletters: Windows Networking Strategies, and Identity Management. Comments about these newsletters should be sent to him at these respective addresses: windows@vquill.com, identity@vquill.com .

Kearns provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail.



ARCHIVE

Archive of the Identity Management Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment