[Log In] []

Exploring the science and magic of Identity and Access Management
Friday, November 8, 2024

Celebrating 40 years on the moon!

General
Author: Mark Dixon
Monday, July 20, 2009
8:01 pm

I grew up in rural Idaho in a home without television.  But forty years ago today, our family stopped by a neighbor’s home on the way home from evening church service to watch television coverage of the the moon landing.  What a wonderful experience! I had grown up through the age of Sputnik, Vanguard, Mercury, Gemini and Apollo.  The first time I can remember being punished for doing something wrong was when I stole paper from my first grade classroom to draw pictures of rockets!  To witness the first manned space flight to the moon was fantastic.

So today, as we celebrate the 40th anniversary of this event, I tip my hat again to all those who made it possible – from President Kennedy who challenged the nation to accomplish this incredible feat – to the engineers who used slide rules, not hand held calculators, to design the equipment  – to the brave astronauts who had the privilege to make the journey.  Bravo all!

Technorati Tags: , , ,

Comments Off on Celebrating 40 years on the moon! . Permalink . Trackback URL
 

links for 2009-07-18

General
Author: Mark Dixon
Saturday, July 18, 2009
2:00 am
Comments Off on links for 2009-07-18 . Permalink . Trackback URL
 

links for 2009-07-17

General
Author: Mark Dixon
Friday, July 17, 2009
2:00 am
Comments Off on links for 2009-07-17 . Permalink . Trackback URL
 

Tokenization to Secure Sensitive Data

Identity
Author: Mark Dixon
Thursday, July 16, 2009
8:57 am

In her Network World column earlier this week, Linda Musthaler described a fairly new technology called "tokenization" that is gaining interest from organizations that have much to lose from data breaches, such as credit card merchants and financial institutions.  She uses the example of payment card data to describe how the tokenization process works:

"A merchant has a point of sale system where customers swipe their credit or debit cards to initiate a payment transaction. Among the information from the magnetic stripe on the back of the card is a 16 digit number called the primary account number (PAN). Any thief who can gain access to the PAN has enough information to use the card data fraudulently. The PAN (i.e., the cardholder data) is sent to a token server where it is encrypted and placed into a secure data vault. A token is generated to replace the PAN data in the merchant’s storage systems or business applications. If the merchant needs access to the original cardholder data again — say to issue a refund on the credit card — the merchant is authorized to reach into the secure data vault to look up the PAN again."

What benefit does this provide to companies?

"First and foremost, it takes highly sensitive data out of the business processes that would use customer data. This reduces the likelihood that the real data can be stolen off of servers or from applications. If a thief steals tokenized data, he can’t use it to retrieve the real data, since he isn’t authorized to access the secure data vault. Instead, he ends up with a bunch of random numbers that don’t mean anything to him."

Linda also refers to a post on CreditCards.com by Jay Mcdonald, who explores the potential for tokenization to increase credit card security.  Quoting Randy Carr, vice president of marketing for Shift4, developer of a commercial tokenization technology, Jay writes:

"Carr believes the game-changer in the equation is today’s hacker. ‘These aren’t college students doing it anymore; they’re ex-Soviet operatives, and they’re serious guys. They’re not there to get 20 card numbers; they’re there to get 100 million card numbers,’ he says.

"Their purpose, Carr says, is not to purchase golf clubs, but to fund terrorism, which may explain why the FBI and other intelligence agencies have been inviting Carr and his counterparts for tea."

It will be interesting to see how this technology is deployed or adapted in the next few years.  Perhaps the recent hacking of government computer systems will accellerate federal government interest.

Technorati Tags: , ,

Comments Off on Tokenization to Secure Sensitive Data . Permalink . Trackback URL
 

links for 2009-07-16

General
Author: Mark Dixon
Thursday, July 16, 2009
2:00 am
Comments Off on links for 2009-07-16 . Permalink . Trackback URL
 

Dilbert: Best Practices for Compliance

Identity
Author: Mark Dixon
Wednesday, July 15, 2009
11:43 am

Recently, I have been working on a white paper addressing best practices for using Identity and Access Management software in meeting regulatory compliance requirements.  Sunday morning, I gained a new perspective on best practices for compliance from the Dilbert comic strip.

Perhaps I should publish my white paper in comic strip format!

Technorati Tags: , , , ,

Comments Off on Dilbert: Best Practices for Compliance . Permalink . Trackback URL
 

OpenSSO Enterprise: Fedlet for .NET

Identity
Author: Mark Dixon
Wednesday, July 15, 2009
10:30 am

My wife looked up incredulously from her desk as the music started. "That is a bit out of character for you, isn’t it?" she asked.

Well, it was just the soundtrack to the latest outlandish creation of Sun’s product manager extraordinaire, the "Smoking Monkey" himself, Daniel Raskin. A clever video to introduce the newly released "Fedlet for .NET."

 

 

You can access the new Fedlet by downloading OpenSSO Enterprise Update 1.

Then, in words of those famous founts of curmudgeonly wisdom, Statler and Waldorf, "Play it again!"

Technorati Tags: , , , , ,

Comments Off on OpenSSO Enterprise: Fedlet for .NET . Permalink . Trackback URL
 

links for 2009-07-10

General
Author: Mark Dixon
Friday, July 10, 2009
2:00 am
Comments Off on links for 2009-07-10 . Permalink . Trackback URL
 

links for 2009-07-07

General
Author: Mark Dixon
Tuesday, July 7, 2009
2:00 am
Comments Off on links for 2009-07-07 . Permalink . Trackback URL
 

links for 2009-07-03

General
Author: Mark Dixon
Friday, July 3, 2009
2:00 am
Comments Off on links for 2009-07-03 . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.