In-depth

Identity: the heart of all security problems

The joke is, on the internet, no-one knows you're a dog. In fact, weak identity remains one of IT's core security problems.

Inside the Enterprise: In technology, a whole host of problems boil down to identity and authentication issues.

Is the right person accessing the right records on a database? Is that laptop encrypted? Is sensitive email being viewed only by those who are entitled to see it? Is the person using mobile banking, who they claim to be?

A host of problems from data loss to spam have their roots in weak identity, and in particular, our continued reliance on passwords.

It is an ambitious goal. And, as the Global Identity Foundation concedes, it has been tried before with only limited success.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

In a report looking at the cyber security threat landscape during 2013, the European Union's cyber security agency (ENISA), points out that if end users adopted simple security measures, it would halve the number of cyber attacks, even as hackers have increased the sophistication of their tools.

A need for strong, secure, end-to-end authentication was identified by ENISA as one issue that everyone involved in the internet economy needs to consider.

And the idea of establishing a single ecosystem for strong identity lies behind the formation of a new organisation, the Global Identity Foundation.

The new body builds on work started by organisations such as the Jericho Forum and the Cloud Security Alliance, but takes the idea further. The goal is ambitious: to create a secure identity model that can work just as well for people, devices and organisations, but yet isn't controlled by any one organisation, or relies on any single piece of technology or equipment, such as a token.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/network-internet/web-browser/354614/microsoft-developer-declares-its-time-to-ditch-ie-for-edge
web browser

Microsoft developer declares it's time to ditch IE for Edge

23 Jan 2020