Your Identity: 'Costanza Style' Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed. Largest coordinated ATM rip-off ever nets $9+ million in 30 minutes And Cisco Subnet blogger Jamey Heary explains how they did it. Public Greets Massive Data Breach With Collective Yawn On January 20, as most of the nation focused on an historic inauguration, Heartland Payment Systems, a credit card payment processing company, acknowledged that data thieves had installed spyware on its network to steal credit card details throughout 2008. The company says it handles about 100 million payments a month, and doesn't yet know how much information was stolen; the theft might be the biggest data breach ever. Putting Context in Identity I had a wonderful time at last week's 2nd annual European Identity Conference in Munich. Martin Kuppinger and his crew at Kuppinger Cole + Partner for putting on an excellent conference, one which I highly recommend you add to your calendar for next year. I'd also like to thank the great guys who put themselves in harm's way (well, harm to their reputations) by participating in the three hour long panel sessions I moderated on the general topic of "Putting Context in Identity." A 'real world' look at the facets of identity I just got back from a 7-day music festival - an excellent opportunity to further investigate pseudonyms, personas and roles. It was, by far, the most entertaining vacation I've taken in many years but it was also very enlightening as a "real world" look at these facets of identity. Is a pseudonym the same as a persona? We were recently having one of our interminable discussions on the Identity Gang mailing list (this was the privacy vs. anonymity discussion which dates back, oh, dozens of years) when Oracle's Nishant Kaushik - identity architect at Oracle and author of the Talking Identity blog - raised an interesting question: "Isn't a pseudonym the same as a persona [as defined in the identity management world, by my understanding]?" Well, there's nothing I like better than chewing over the meaning of words - so I did. Different facets of a single identity I was contemplating the Christmas season and what it means to those of a religious bent when it occurred to me that the idea of "persona" - different facets of a single identity - is thousands of years older than our digital world. Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. Don't be a data loss victim Somebody was siphoning customer financial data from a chain of gas station/convenience stores. Plus: 7 ways to stop data breaches The experts all say that data security goes beyond the use of technology. Nevertheless, there are numerous tools and techniques that IT professionals can use to improve their organization's stance on data security. February giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here. |
No comments:
Post a Comment