The CyberForge audio broadcast delivers an opinionated viewpoint on using cybersecurity research and development to build and enhance products and services for the common good.
…
continue reading
Data is the pollution problem of the information age, and protecting privacy is the environmental challenge Bruce Schneier In this 7-minute episode, I discuss: My impressions of the Cloud Identity Summit Why we are at an inflection point now in how the internet should be designed for the future GOV.UK Verify’s positioning of LOA 1 credentials…
…
continue reading
"What I try to do is draw upon a history of working with ... different types of stakeholders ... to draw connections, especially when you have communities that have different priority sets ..." Joni Brennan I missed my regular broadcast schedule for this podcast last week since I was at the Cloud Identity Summit. So to make up for that, I wanted to…
…
continue reading
The nine most terrifying words in the English language are "I'm from the government, and I'm here to help." Ronald Reagan In this 7-minute episode, I talk about: New Zealand Government’s research on pain points to address with digital services Google’s My Account feature - will anyone use it? OPM Data breach…
…
continue reading
The wise man must remember that while he is a descendant of the past, he is a parent of the future. Herbert Spencer In this 9-minute episode, I talk about: Project Abacus announcement at Google I/O 2015 Project Vault announcement at Google I/O 2015 IRS data breachAutor: Anil John
…
continue reading
The problem with the nothing-to-hide argument is the underlying assumption that privacy is about hiding bad things Daniel J. Solove In this 6-minute episode, I talk about: Data collection and security and its impact on digital services Americans’ Attitudes About Privacy, Security and Surveillance Potential credential service providers for high valu…
…
continue reading
Too many cooks spoil the broth Jane Austen In this 5-minute episode, I talk about: The proliferation of certification programs Flaming hoops encountered by identity services seeking certification Possible consolidation options for some identity certification programsAutor: Anil John
…
continue reading
I skate to where the puck is going to be, not where it has been Wayne Gretzky In this 7-minute episode, I talk about: The Digital Identification and Authentication Council of Canada (DIACC) strategy Tools for OAUTH2 and OpenID Connect testing UX research from New ZealandAutor: Anil John
…
continue reading
When it comes to privacy and accountability, people always demand the former for themselves and the latter for everyone else David Brin In this 6-minute episode, I talk about: Privacy awareness week What hackers are looking for in health-care data Federation handler launch by WAYF.dkAutor: Anil John
…
continue reading
Maps codify the miracle of existence Nicholas Cran In this 6-minute episode, I talk about: The authority of map makers and the OIXnet registry De-identification Google shutting down legacy OpenID 2.0 infrastructureAutor: Anil John
…
continue reading
Knowing the enemy enables you to take the offensive, knowing yourself enables you to stand on the defensive Sun Tzu In this 10-minute episode, I talk about: Implications to public sector digital services based on results of the Verizon 2015 data breach investigations report Value of health care history data GSA RFI on Connect.gov business models…
…
continue reading
If you want something new, you have to stop doing something old Peter F. Drucker In this 10-minute episode, I talk about: FIDO Alliance and its challenges Liability and identity federations Request for comments on NIST SP 800-63-2, Electronic Authentication GuidelineAutor: Anil John
…
continue reading
Whatever you can do, or dream you can, begin it. Boldness has genius, power and magic in it. Goethe In this 4-minute episode, I talk about: The importance of the trends that are driving 2015, the year of digital transformation Audit results of Truecrypt and vulnerabilities in JWT libraries Tax fraud advice from scammers…
…
continue reading
Always listen to experts. They'll tell you what can't be done, and why. Then do it. Robert A. Heinlein In this 5-minute episode, I talk about: The competing perspectives of the acquirer (business owner) of services and the certification authority Identity services and the financial sector Privacy pilot funding opportunity from the NSTIC NPO…
…
continue reading
The human understanding when it has once adopted an opinion draws all things to support and agree with it. Francis Bacon In this 3-minute episode, I talk about: Why the US CTO is wrong about technical competency in government Solving the wrong problem when it comes to addressing government technical competency…
…
continue reading
Do not go gentle into that good night, Old age should burn and rave at close of day; Rage, rage against the dying of the light. Dylan Thomas In this 3-minute episode, I talk about: Why SAML is still alive and well Interesting privacy related features of the latest version of the Shibboleth Identity Provider…
…
continue reading
Good intentions can often lead to unintended consequences. Tim Walberg In this 3-minute episode, I talk about: Apple Pay and Fraud Why the issue is not about the token but something all too familiarAutor: Anil John
…
continue reading
The test of a first-rate intelligence is the ability to hold two opposed ideas in mind at the same time and still retain the ability to function. F. Scott Fitzgerald In this 3-minute episode, I talk about: The wildly diverging perception of the technical competency of government What is missing from the the social provider’s marketing on data encry…
…
continue reading