Combating Identity Theft
by Paul Meadowcroft - Head of transaction security of the e-security activities of Thales - Tuesday, 7 March 2006.
As the digital identity market evolves, we will of course see many examples of both issuer-centric federated identity and application-centric integrated identity networks developing. The federated identity model is best suited to small communities with rich, intensive interactions, and with simple risk management requirements. The integrated identity model provides a new perspective on identity management for large application owners, and significantly simplifies the deployment and management of applications which span communities, require a tiered authentication and risk model or raise significant privacy issues.

Spotlight

How security pros deal with cybercrime extortion

1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files. 86% of security professionals believed their peers at other organizations have brokered deals with cybercriminals.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Apr 1st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //