Just a quick note to anyone who gets to my old blog address at https://eternaloptimist.wordpress.com: I’ve moved, you can find me now at http://eternallyoptimistic.com.
Thanks,
Pamela
Just a quick note to anyone who gets to my old blog address at https://eternaloptimist.wordpress.com: I’ve moved, you can find me now at http://eternallyoptimistic.com.
Thanks,
Pamela
For whatever reason, I’ve been pondering similarities and differences between financial and IT risk lately, and one big difference seems to be around reputation in these two areas. The financial world painstakingly maintains institutionalized memory of credit issues through standardized credit ratings. Companies, cities, and even countries are rated based on current and past performance, and a ratings downgrade is a BIG deal.
Why isn’t there an analogous service for systems security risk? For example, Mike Ramirez just pointed out a data breach at Monster.com, I’d love to go somewhere and see, was that the first time? Have they been breached before, and I simply didn’t hear about it? How about Heartland Payment Systems? It seems to me that right now, companies can get away with repeat offenses, simply by flying under the radar.
Of course, there is always the Listeriosis Clause to consider — who do you trust more, the company with a dedication to quality that is forced to disclose, or the lazy/ignorant company who never even looks, and therefore never has to tell?
In any case, I’d like to see collections of disclosures about the various services I choose to use or do business with. I’d like to see data collection for the purposes of comparing privacy policies, TOSs, known breaches of or challenges to those policie. Another issue that I believe could gain prominence is being able to easily research whether the companies I interact with are sending/storing my information across international borders. I think there would be some really interesting discoveries in such a body of data.
http://www.pingidentity.com/vid-test.html
I wasn’t expecting to enjoy this — but I did. There are some great lines, you just have to get past the obligatory intro scenes 🙂 The plot is familiar — not because I’ve seen the movie but because I’ve lived the integrations.
My favorite — princess Leia having to stop transmitting her plea for help because the “storm-consultants” were coming…. there are more but I wouldn’t want to spoil it for you.
100 million credit cards compromised. Just like that. Heartland Payment Systems was hacked in May, and now the following January they are famous for all the wrong reasons.
What gets me about this, is that this processor was storing and forwarding the exact same set of data that the consumer provided. Why??? Why not alter that data at each step, such that the data needed for processing is not the same set of data needed to initiate a transaction? Using these kinds of methods may not prevent theft of data, but they can sure as heck increase the difficulty in using that data to make a profit.
I wonder what the cost is to the credit card companies per re-issued card? Adding the postage, labor, and manufacturing time, I have to imagine this will not be cheap. Changing an already established system isn’t cheap either, but what are the options? Getting better promises of security from your payment vendors? Yeah. Right.
Yesterday’s Azigo post is now stylin’, with extra features like images and bullets! If you held off of reading that post because the large bricks of unformatted text were making your eyes bleed, you can go back now: https://eternaloptimist.wordpress.com/2009/01/13/azigo-a-go-goes/
Otherwise, check out the comments on the post, also two corrections:
Apologies for the formatting wackiness, and the omissions/errors,
Pamela
I’ve finally had a chance to use Parity’s Azigo Identity Selector, and I have to say I’m impressed.
Azigo’s biggest differentiating factor is the fact that cards are stored in the cloud — Azigo uses an Adobe AIR front-end to talk to your cloud-based cardstore and submit your cards. Of course it doesn’t look any different to the user, until the user installs azigo on a second computer, and discovers that their cards are ready to go, no importing required.
Here’s what I loved about Azigo:
Issues I found with Azigo:
Things I wonder about Azigo
Overall, I have to say that this selector greatly exceeded my expectations. Not only is the product really polished, but the people behind the product have been really responsive, making sure to address all of the issues I brought up to them. Azigo has really made good on the promise of information cards here. For those who don’t follow this area closely, I suggest keeping your eyes on the parent company, Parity. Parity has always been a leader with respect to mindshare in the area of information cards, but now their products are showing that they are not just up in the ivory tower. They mean business, and they are going to raise the stakes.
Andy has a claims quandary – check out his blog post to see it: http://xditao.blogspot.com/2009/01/claim-game.html.
To paraphrase, the question is how could a Library model a set of roles that a user might possess, and ask for possession of those roles in a way that doesn’t inconvenience the user by forcing them to undergo multiple card transactions?
Here is my proposed solution, and I just made this up so feel free to call me an idiot if deserved:
Here’s what I like about this scheme:
What do you think Andy? Could it work?
Hats off to Kaliya for organizing She’s Geeky this year – I wish I could be there.
I love the idea of showing up and just finding out what other women in technology are doing, it seems like such a positive experiment. I hope you all have a great time!
Recent Comments