Remove Article Remove Authentication Remove Banking Remove Licensing
article thumbnail

The AI cat and mouse game has begun

CIO Business Intelligence

If you are a CIO or CISO and haven’t yet read this article – Finance worker pays out $25 million after video call with deepfake ‘chief financial officer,’ you should and then share it with your entire company. Two-factor authentication practices just won’t cut it. It could save your company millions, and potentially much more.

Social 94
article thumbnail

SSI is the Key to Claiming Ownership in an AI-Enabled World

Phil Windley

Jamie Smith recently wrote a great article in Customer Futures about the kind of AI-enabled personal agents we should be building. These identities are not just tools for authentication; they're pivotal in distinguishing our human-generated creations from those produced by AI. There are a number of ways to do this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Authentic Digital Relationships

Phil Windley

In his article Architecture Eats Culture Eats Strategy , Tim Bouma makes the point that the old management chestnut Culture Eats Strategy leaves open the question: how do we change the culture. Our online relationships with ecommerce companies, social media providers, banks, and others are cold and impersonal, but also relatively efficient.

article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. m Kaya wrote:Thank you Ross for the great articl.[ So the excuses are running out.

Trends 60
article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

But this method of authentication is flawed; either hashed or hashed and salted, usernames and passwords can still be stolen and reused. Vamosi: Identity -- I’m talking specifically about authentication and to some degree its follow-on authorization -- is one of the most important, yet least talked about aspects of security.

article thumbnail

Token-Based Identity

Phil Windley

I've spent some time thinking about this article from PeterVan on Programmable Money and Identity. Peter references a white paper on central bank digital currencies and one on identity composability by Andrew Hong to lead into a discussion of account- and token-based identity. Even paying with a credit card doesn't require that.

Insurance 137
article thumbnail

Lessons from 2020, and What to Expect in 2021: An Evolutionary Time in Cyber and Privacy

SecureWorld News

Our critical infrastructure —such as electrical grids, hospitals, and banks—are prime targets, and increasingly vulnerable. But, at the same time, businesses are starting to use biometrics, especially in the employee context, to confirm identities and authenticate users. In the U.S.,