Archives
The Password is Dead. Time for Better Online Security.
Forbes reported on the recent release of the National Strategy for Trusted Identities in Cyberspace in an article by Kashmir Hill dated April 15, 2011. The article provides a great understanding of what the NSTIC aims to accomplish and why it was necessary in the first place. Essentially, the days of the username and password […]
Administration Releases National Strategy for Trusted Identities in Cyberspace
The White HouseOffice of the Press Secretary For Immediate Release April 15, 2011 Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Indentities [sic] in Cyberspace [full strategy, here] WASHINGTON, DC – Today, the Obama Administration released the National Strategy for Trusted Identities in Cyberspace (NSTIC), […]
House Rejects FCC’s ‘Open’ Internet Rules
Reuters reports, in an article by Kevin Drawbaugh, dated April 8, 2011, that the U.S. House of Representatives voted to "reject Internet 'neutrality' rules that were adopted last year to keep big Internet service providers from blocking certain traffic." The vote, which largely followed party lines, had 240 votes for removal of the rules, […]
U.S. Warns of Gov’ts Trying to Control the Internet
On April 8, 2011, Yahoo! News reported, in an article by Bradley Klapper of the Associated Press, that the Obama Administration, specifically the State Department, warned "that governments around the world are extending their repression to the Internet, seeking to cut off their citizen's access to websites and other means of communication to stave off […]
When Do People Care Who You Are Online?
In an article dated April 1, 2011, Jessica Herrera-Flanigan, of nextgov, reports on the pitfalls of a "federated authentication" system, which were recently highlighted by Ross Anderson, a professor of Security Engineering at Cambridge University. Professor Anderson recenlty published a paper entitled "Can we Fix the Security Economic of Federated Authentication?" in which he brings to […]