Cloud Fundamentals Video Series: Evolving Identity Requirements

From the Trustworthy Computing Blog: Posted By: Tim Rains, Director, Trustworthy Computing A key topic when it comes to security is identity.  But, the laws of identity tell us “the Internet was built without a way to know who and what you are connecting to…Since this essential capability is missing, everyone offering an Internet service…

0

Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security

Today, I’m happy to announce we are releasing Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security at the International Association of Privacy Professionals (IAPP) Global Privacy Summit in Washington, D.C. Complimentary copies are available for conference attendees at the Microsoft booth, and a digital version is available online.  The guide…

2

Signing in to Windows 8 with a Windows Live ID: Privacy and Security

Steven Sinofsky, President, Windows and Windows Live Division at Microsoft, writes on the Building Windows 8 blog about Signing in to Windows 8 with a Windows Live ID, including a section on “Privacy and Security” below: With Windows 8, we introduce the optional capability to sign in to your PC with a Windows Live ID…

1

How to Recover your Hotmail account

Chris Stetkiewicz writes on the Security Tips & Talk Blog: We recently received this email: “My Hotmail account was hacked and taken over by the classic ‘I’m in London and I’ve been mugged’ scam. It appears that the hacker has changed the basic verification information on the account and every attempt to reset the password…

5

Microsoft’s response to the DigiNotar compromise

An important update from the Microsoft Security Response Center: This blog post was updated Sept. 5, 2011 below. Microsoft’s investigation into the scope and impact of the DigiNotar compromise has continued over the holiday weekend. We’ve now confirmed that spoofed certificates for *.microsoft.com and *.windowsupdate.com are among those issued by the Dutch firm. Users of…

0

Kim Cameron Responds to Critique of Identity Federation

Microsoft’s Kim Cameron responds on his Identity Blog to recent criticism of the concept of identity federation: in a recent piece at The Federal Circle, Earl Smith II, managing partner, comes out “all guns blazing” against identity federation and the “weird and wonderful” Laws of Identity.  Earl wishes he could “simplify” digital identity, rejecting identity federation as being too…

0

Marc Davis and Kim Cameron Keynotes from Pii2010

Last week I told you about the Privacy Identity Innovation 2010 (Pii2010) Conference in downtown Seattle. Among the highlights of the conference two keynotes by Microsoft presenters, including Kim Cameron, Chief Architect of Identity in the Microsoft Identity and Security division; and Marc Davis, who was just hired to the position of partner architect for…

0

Non-Personal Information – like where you live?

Kim Cameron of Microsoft writes on his Identity Blog: Non-Personal Information – like where you live? The notion that location information tied to random identifiers is not personally identifiable information is total hogwash. Posted on Tuesday 24 August 2010 Last week I gave a presentation at PII 2010 in Seattle where I tried to summarize what I…

0

Using Consumer Identities for Business Interactions

Microsoft’s Kim Cameron writes on his Identity Blog: Using Consumer Identities for Business Interactions Posted on Saturday 10 July 2010 Mike Jones writes about an “identity mashup” that drives home a really important lesson:  the organizational and technical walls that used to stand in the way of Internet business are dissolving before our very eyes.  The change agent is the…

0

Doing it right: Touch2Id

Microsoft’s Kim Cameron writes on his Identity blog: And now for something refreshingly different:  an innovative company that is doing identity right.  I’m talking about a British outfit called Touch2Id.  Their concept is really simple.  They offer young people a smart card that can be used to prove they are old enough to drink alcohol.  The technology is now well beyond the…

0