Secure Personal Identification Systems: Policy, Process and Technology Choices for a Privacy-Sensitive Solution
by Smart Card Alliance
This paper describes policy, process and technology issues that need to be considered in implementing a privacy-sensitive secure personal ID system. The different ID technologies that are available are compared, and the role that smart cards can play in implementing trusted personal credentials is presented.
Posted on 28 January 2015. | Researchers found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials.
Posted on 23 January 2015. | The DMARC specification has emerged in the last couple years to pull together all the threads of email authentication technology under one roof—to standardize the method in which email is authenticated, and the manner in which reporting and policy enforcement is implemented.