Secure Personal Identification Systems: Policy, Process and Technology Choices for a Privacy-Sensitive Solution
by Smart Card Alliance
This paper describes policy, process and technology issues that need to be considered in implementing a privacy-sensitive secure personal ID system. The different ID technologies that are available are compared, and the role that smart cards can play in implementing trusted personal credentials is presented.
Here are the major considerations organizations should incorporate into their compliance programs, as well as pitfalls that can be avoided to ensure businesses stay compliant while using cloud computing.
Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.