Combating Identity Theft
by Paul Meadowcroft - Head of transaction security of the e-security activities of Thales - Tuesday, 7 March 2006.
Bookmark and Share
As the digital identity market evolves, we will of course see many examples of both issuer-centric federated identity and application-centric integrated identity networks developing. The federated identity model is best suited to small communities with rich, intensive interactions, and with simple risk management requirements. The integrated identity model provides a new perspective on identity management for large application owners, and significantly simplifies the deployment and management of applications which span communities, require a tiered authentication and risk model or raise significant privacy issues.

Spotlight

64% of companies expect cyber attacks

Posted on 9 July 2014.  |  Nearly two-thirds of UK IT decision-makers said they expect their organization to be the target of a cyber attack within the next 12 months. 32% of those surveyed confirm their business was hit by a cyber attack during the past year.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 10th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //