Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: authentication

Campaign Lessons Learned—Part 3: Authenticity, Authority and Access

– From the cybersecurity professionals’ point of view, identity and access management (IAM) is really all a matter of authenticity, authorization and access permissions. Similarly, if the origin of a news item or blog or comment can be traced to a provably authoritative source, then it is more…

Are Social Media Bots “Good”?

– I found it really eye-opening to read Nick Bilton’s article “Phony Friends, Real Profit” which appeared on page E2 of The New York Times of November 20, 2014, and seems to be in favor of using bots to represent fakes. Either Bilton was writing with his tongue in his cheek or, if not, was…

It’s About Time … Tamper-Proofing Aircraft Systems

– It took a while after the disappearance of flight MH370 and a series of harebrained conspiracy theories … a month in fact … before the necessity to tamper-proof avionics became a topic for discussion. For example, Andy Pasztor and Jon Ostrower wrote a piece in The Wall Street Journal…

NSA: IAM … What IAM?

– Update: It has been several weeks since the Snowden leaks and, at time of writing, his every move, real and virtual, is being tracked by the media. While Snowden having access to top-secret information was mentioned briefly, as noted in this column, it wasn’t until weeks after the leaks (and…

The FFIEC and Password-Generating Tokens

– In June 2011, the FFIEC (Federal Financial Institutions Examination Council) issued a “Supplement to Authentication in an Internet Banking Environment,” available at http://www.ffiec.gov/pdf/Auth-ITS-Final%206-22-11%20(FFIEC%20Formated).pdf The FFIEC comprises five financial regulatory…