identity management

Episode 102: Is Blockchain the Foundation for a Secure Internet of Things?

In this episode of the Security Ledger Podcast (#102): we think of blockchain as the immutable and distributed ledger that vouches for crypto currency transactions. But is its real potential as a foundation for a secure Internet of Things? We speak with Vaughan Emery, the CEO of the start-up Atonomi, which markets itself as a secure ledger for Things. 

RSAs CTO is Bullish on Security. Blockchain? Not so much.

The success of blockchain technology in securing cryptocurrencies doesn’t make the technology a good fit for securing the Internet of Things, RSA Security Chief Technology Officer Zulfikar Ramzan says. Check out our exclusive conversation with Zully about IoT, blockchain and the state of the information security industry. 

WeChat

WeChat set to become China’s official electronic ID | Security Affairs

Officials in the Nansha District of Guangzhou, China plan to allow citizens to use the WeChat social networking application as a form of official identification for access government and private sector services, Security Affairs reports. 

Top Secret

Podcast: Uber Breach Puts Focus on Securing DevOps Secrets

The hack of Uber and the loss of information on 57 million customers is just the latest security incident stemming from what our guest Elizabeth Lawler calls “DevOps secrets” – valuable credentials, APIs and other sensitive information that often end up exposed to the public as a result of lax continuous development operations. In this Spotlight Edition* of The Security Ledger Podcast, sponsored by CyberArk, we talk with Elizabeth about how to contain DevOps secrets and secure the secret super user lurking in modern organizations: highly privileged application code. 

Passwords

Opinion: NIST Guidelines make Digital Identity all about Risk

Contributing writer Chip Block of the firm Evolver says the new NIST Digital Identity guidelines do much more than rethink passwords. They help solve an age old problem: how to prioritize security spending.