Joho the Blog » [SN] Panel: Security and Identity
EverydayChaos
Everyday Chaos
Too Big to Know
Too Big to Know
Cluetrain 10th Anniversary edition
Cluetrain 10th Anniversary
Everything Is Miscellaneous
Everything Is Miscellaneous
Small Pieces cover
Small Pieces Loosely Joined
Cluetrain cover
Cluetrain Manifesto
My face
Speaker info
Who am I? (Blog Disclosure Form) Copy this link as RSS address Atom Feed

[SN] Panel: Security and Identity

Two companies in the identity space and two on security. Kevin Werbach Himself is moderating.

Jim Kollegger, CEO of BBX Technologies. Security is getting dicier. BBX locks down servers, rolls back to the previous version, and puts the invading executable up against a wall with a blindfold around its eyes and its pants down at its knees. [This is my way of putting it.]

Marc Hedlund of Sana Security. There are security companies that are doing exceptionally well because the threats are so real. His company uses biological models to improve security. [My personal favorite: Playing dead. But that’s just because I have a thing about being sniffed by wild animals.]

Joe Hildebrand, chief architect of Jabber. “When you talk about knowledge workers, all you have is your reputation.” But reputation is extremely complex, what with people moving around and all. The edges of the network matter. You have to make decisions out there. But reaching them can be a challenge.

Nikolaj Nyholm of Ascio Technologies. He begins by apologizing on behalf of the identity industry for working on the wrong problems. He’s unhappy with federated ID systems because they create a layer on top of the Stupid Network. It’d be like asking mail servers to federate. Instead, I need an identifier and a way to authenticate that identifier.

Q (Amy Wohl): We have multiple identities. And we need to solve the problem of needing separate passwords for every account.

A: (Joe) We need to disambiguate “identity.” All we need is identifying information for the different types of transactions.

A: (Nikolaj) We need to authenticate that you have possession of a particular identifier, just as you type in a PIN when you use your ATM card, enabling your bank to authenticate that it’s you using your card. That’s missing on the net.

Q: What will drive people to want this stuff?

A (Kevin): Spam.

Previous: « || Next: »

Leave a Reply

Comments (RSS).  RSS icon