Archives
NSTIC update: The Economist/CSO
Quiet night, so I’m going to go back to an article I missed over a week ago. On 2/9, The Economist posted an article covering online identity verification and the National Strategy for Trusted Identities in Cyberspace, or NSTIC. NSTIC is a USG online identity initiative where users would get an identity credential from an […]
Cyber Roundup (1/5): NDAA addresses cyber, CyberCity, USPS & NSTIC, Human Enhancement, and more . . .
A survey of recent cyber news . . . *** Amber Corrin writes for FCW that the 2013 National Defense Authorization Act (NDAA) “require[s] DOD officials to report on cyber operations to Congress on a quarterly basis,” including briefings on “all offensive and significant defensive military operations in cyberspace” and interagency processes “for coordinating and […]
NSTIC Update: FierceGovernmentIT/Nextgov
On 10/22, Molly Bernhart Walker wrote for FiereceGovernmentIT on NSTIC and the Centers for Medicare and Medicaid Services (“CMS”). According to the article, CMS is interested in relying on NSTIC’s federated identity management program as a relying party rather than a credential provider. The article also mentioned that the Office of Management and Budget “is […]
Cyber Roundup (9/15): No Cyber EO please, Gen. Dempsey and Zuckerberg talk cyber, experts ID two huge Chinese cyber gangs, and more . . .
A quick survey of some recent cyber news . . . *** Mark Clayton wrote a very interesting piece for The Christian Science Monitor on how experts have ID’d two gangs as those behind most of that pervasive Chinese cyberexploitation. Experts have named one gang “Elderwood” and named the other gang the “Comment Crew.” According […]
Cyber roundup (4/20): More CISPA, hackers bring down U.S. website covering Bo Xilai, Lawfare interviews the Estonian president, an NSTIC update, and authenticity v. anonymity
A quick survey of today's cyber news . . . *** On 4/18, Jason Koebler reported for the Chicago Tribune on how Rep. Mike Rogers, the author of CISPA, explained that the bill is designed to stop Chinese cyber-espionage. According to Rep. Rogers, China is an "economic predator" because it "has stolen so much [IP] […]
Cyber roundup (4/10): In defense of CISPA, an analysis of information-sharing, cyber-threats hamstring U.S. cooperation with allies, a global cyber arms race, NSTIC’s pilot program moves forward, and the CFAA and your employer’s computer use policy
A busy night in cyber news . . . *** On 4/10, Gerry Smith reported for the Huffington Post on how lawmakers are defending CISPA, a House cybersecurity proposal. Notably, CISPA's authors–Rep. Mike Rogers and Dutch Ruppersberger–rebutted criticisms that CISPA doesn't protect consumers "from having their private data shared with the government." Privacy groups argue […]
A new theory of digital identity – Risk – SC Magazine Australia
The March 14, 2012, edition of SC Magazine, Australian Edition, includes Part B of a two part series on “A New Theory of Digital Identity.” Part A was entitled “Federated Identity: Easier said than done.” Part B is entitled, “The Ecology and Natural History of Digital Identity,” and includes this view of the U.S. National […]
NSTIC commits $2.5 million to build governance body | ZDNet
ZDNet reports on March 14, 2012, that the National Institute of Standards of Technology is offering grant money “to establish an independent steering committee led by the private sector that works in conjunction with the federal government to support” the National Strategy for Trusted Identities in Cyberspace, quoting Jeremy Grant, senior executive adviser for identity […]
Will A Standardized System For Verifying Web Identity Ever Catch On? CNN
On Feb. 15th, 2012, Mark Milian reported for CNN on web identity management. Noting the weakness inherent to passwords, Milian mentioned one of our favorite identity management proposals: NSTIC (National Strategy for Trusted Indentities in Cyberspace). Again, the idea behind NSTIC is that people can choose an entity (perhaps a company like Google, or Paypal) […]
SOPA/PIPA Update
On Jan. 13th, 2012, David Kravets wrote for Wired on SOPA and PIPA, the controversial legislation designed to fight online copyright infringement. There has been fierce resistance to the legislation because many feel that it would limit the internet's freedom and compromise the DNS (the naming system that underlies the internet). According to the article, […]