MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
U.S. Banker
January 2004
Karen Krebsbach
Biometrics Takes Hold Overseas, But Not in U.S. U.S. banks, tied to legacy systems, are reluctant to start over with what many consider untested technology. Then there's the real bugaboo: privacy. mark for My Articles similar articles
IEEE Spectrum
January 2006
Erico Guizzo
Loser: Britain's Identity Crisis Proposed biometric ID cards won't prevent fraud or terrorism mark for My Articles similar articles
Wall Street & Technology
April 18, 2008
Melanie Rodier
Financial Institutions Evaluate Biometrics While financial institutions aren't yet ready for consumer-facing biometrics deployments, these technologies are gaining popularity for behind-the-scenes authentication. mark for My Articles similar articles
T.H.E. Journal
June 2006
Doug Gale
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. mark for My Articles similar articles
InternetNews
April 23, 2007
Roy Mark
A New Fight Against ID Theft Improved cyber security, increased law enforcement and public education top the recommendations of President Bush's Identity Theft Task Force plan issued today. mark for My Articles similar articles
Wall Street & Technology
November 18, 2005
Stronger Authentication Single-factor authentication is insufficient for online financial services, according to the Federal Financial Institutions Examination Council (FFIEC). mark for My Articles similar articles
InternetNews
June 28, 2010
White House Talks Up Online ID Plan New framework aims to better secure user identities to battle online fraud. mark for My Articles similar articles
InternetNews
March 2, 2007
Roy Mark
REAL ID Deadline Evaporates Under Pressure The Department of Homeland Security postpones implementation of controversial law mandating standardized state driver's licenses linked in databases. mark for My Articles similar articles
U.S. Banker
May 2011
Rob Garver
Another Stab at Federated Identity The administration is exploring an identity ecosystem that envisions universal Internet log-in credentials for consumers. Will the prospect of more secure e-commerce win banks over to the idea? mark for My Articles similar articles
Insurance & Technology
March 7, 2006
Peggy Bresnick Kendler
Who Goes There? Insurance industry executives discuss how controlling access to information through identity management is key to securing critical client and corporate data. mark for My Articles similar articles
Entrepreneur
December 2003
Stephen Barlas
Taking Credit Washington shields businesses from identity theft losses. mark for My Articles similar articles
Bank Technology News
February 2007
Andrea Klein
Losses Rise If Reputation is Compromised The banking industry has begun to recognize the true cost of a tarnished reputation. The next and more challenging step for many is mitigating reputational risk, especially as it relates to online security breaches. mark for My Articles similar articles
InternetNews
September 19, 2006
Roy Mark
Group Demands Restitution For ID Theft A federal task force on identity theft urged Congress today to require ID thieves pay victims for the time they spend restoring their credit. mark for My Articles similar articles
InternetNews
November 8, 2005
Clint Boulton
Liberty Needs to Know Who You Are The Liberty Alliance Project creates a group to help companies bring authentication into their folds. mark for My Articles similar articles
IEEE Spectrum
July 2006
Jain & Pankanti
A Touch of Money Biometric authentication systems for credit cards could put identity thieves out of business. Here's how it would work. mark for My Articles similar articles
BusinessWeek
August 8, 2005
Big Brother Britain? The Blair Administration's proposal for biometric ID cards looked like a goner - until the July 7 attacks in London. But critics still worry about their intrusiveness. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
InternetNews
September 22, 2006
Roy Mark
Where Have All The Laptops Gone? The Department of Commerce reports more than 1,000 computers are lost, stolen or missing. mark for My Articles similar articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
National Defense
February 2013
Stew Magnuson
DHS Pushes Back REAL ID Deadline Again to Accomodate Cash-Strapped States The Department of Homeland Security moved the goal posts back in December again when it granted a third extension for 37 states to comply with the REAL ID Act of 2005. mark for My Articles similar articles
InternetNews
May 11, 2005
Michael Singer
'Real ID' Under Fire States and privacy groups mull a legal fight against a bill requiring national IDs citing the high cost and risk of identity theft. mark for My Articles similar articles
InternetNews
July 19, 2007
Roy Mark
DoJ Sends ID Theft Bill to Congress The Bush administration sent proposed legislation to Congress today that aims to update and improve federal identity theft laws. mark for My Articles similar articles
Inc.
August 2003
Robert X. Cringely
They've Got Your Number Identity theft using a combination of computer technology and government information is a major crime just waiting to happen. mark for My Articles similar articles
OCC Bulletin
July 27, 2006
Identity Theft Red Flags and Address Discrepancies Proposed regulations would require financial institutions and creditors to develop and implement a written identity theft prevention program in connection with account openings and existing accounts. mark for My Articles similar articles
JavaWorld
March 2003
Frank Sommers
The first taste of Liberty The Liberty Alliance Project specifications provide a single sign-on mechanism for both Websites and Web services. This article explores how Liberty helps federate a user's identities from different service providers and uses that federated network identity to authenticate a user. mark for My Articles similar articles
Bank Systems & Technology
August 30, 2005
Maria Bruno-Britz
Maximum Security Although all industries are susceptible to data theft, the costs in terms of reputation and dollars are particularly steep in financial services, and most banks are taking measures to reduce the risks associated with handling consumer data. mark for My Articles similar articles
InternetNews
July 21, 2004
Clint Boulton
Securing Identity a Novell, Oracle Affair Vendors use the Burton Group Catalyst Conference as a platform to launch identity management plans. mark for My Articles similar articles
IEEE Spectrum
May 2011
Joshua J. Romero
Fast Start for World's Biggest Biometrics ID Project In India, a few million people have been registered for a biometric database so far - only a billion left to go. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Nancy Feig
Federal Agencies Propose 'Red Flags' for Identity Theft Prevention In response to growing concerns over identity theft, on July 18, several federal agencies proposed a rule that would require financial institutions and creditors to implement identity theft prevention programs. mark for My Articles similar articles
Wall Street & Technology
March 21, 2006
Paul Allen
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. mark for My Articles similar articles
Wall Street & Technology
October 20, 2006
Tim Clark
Password and Identity Management Strategies Begin to Take Shape As financial services firms come to grips with the vulnerability of their IT systems, best practices around password and identity management becomes a paramount concern. mark for My Articles similar articles
National Defense
November 2007
Stew Magnuson
Military Identity Technology Leaps Ahead of Policies To help fight the Iraqi insurgency, the Defense Department has pushed biometric collection technologies into the field. But policies on how best to use them are not fully developed. mark for My Articles similar articles
Searcher
November 2005
Carol Ebbinghouse
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. mark for My Articles similar articles
National Defense
January 2009
Stew Magnuson
Defense Department Under Pressure to Share Biometric Data Within minutes of knocking down the door of a suspected bomb maker in Iraq, U.S. troops can fingerprint everyone they find inside, send the scans across a satellite link, and find out if the subjects are suspected terrorists. mark for My Articles similar articles
Bank Systems & Technology
April 7, 2006
Peggy Bresnick Kendler
Security Outlook A plethora of high-profile data breaches and concerns about identity theft have put the banking industry on high alert. To secure their information assets, banks must implement a cross-channel, multilayered approach that extends beyond technology. mark for My Articles similar articles
PC World
October 2002
Anne Kandra
Don't Let Them Steal Your Good Name Identity theft is skyrocketing -- and it's even being used to fund terrorism. The Web can be a real boon for identity thieves, helping them find information about victims and profit from the crime. mark for My Articles similar articles
CIO
May 15, 2003
Juan Carlos Perez
Reality Unlike TV Biometrics -- the use of IT to identify people using fingerprints, voice, face and hand geometry -- has its limitations. The applications aren't 100 percent accurate, for starters. And technology standards and concerns about privacy also are potential limitations. But it is improving. mark for My Articles similar articles
Wall Street & Technology
June 13, 2006
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. mark for My Articles similar articles
Information Today
September 23, 2014
LexisNexis Introduces Identity Challenges Resource LexisNexis Risk Solutions created a thought leadership platform to educate government agencies and officials about solutions to their identity challenges. mark for My Articles similar articles
Bank Technology News
February 2005
Holly Sraeel
Hot on the ID Theft Trail: Will the Real Jane Doe Stand Up? Welcome to the world of identity theft, where the snatch of an individual's social security number begins that unsuspecting individual's downward financial spiral. mark for My Articles similar articles
Salon.com
October 2, 2001
Katharine Mieszkowski
Wanted: Your name and number The hijackers in the terrorist attacks were masters of identity theft. Now lawmakers are worried about copycat persona stealing... mark for My Articles similar articles
InternetNews
February 14, 2006
Erin Joyce
IT to Endpoints: Who Are You? Security vendors say enterprises need to be a lot more picky about their network access protocols. mark for My Articles similar articles
InternetNews
May 19, 2005
Jim Wagner
Microsoft Examines InfoCard Framework Managing a variety of identity management technologies can be tricky for users, so the Redmond giant is coming up with a framework to include them all. mark for My Articles similar articles
CRM
December 2013
Ray Wang
Why the Battle for Identity Will Affect Customer Experience Merging identities across environments is no easy task. Facebook, Google, and Twitter dominate most social log-ins. Users expect their identity to be transportable from personal to work environments. These implications carry over to customer experience. mark for My Articles similar articles
National Defense
January 2009
Myra S. Gray
Defense Dept. 'Institutionalizing' Use of Biometrics Biometrics use crosses all services. The Army is using biometrics to assist in identifying detainees in war zones mark for My Articles similar articles
The Motley Fool
December 30, 2004
Types of Identity Theft Learn what to look out for, and protect yourself! mark for My Articles similar articles
InternetNews
February 13, 2006
Sean Michael Kerner
VeriSign's VIP Protects Sign-On IDs VeriSign Identity Protection, announced today, will offer users the promise of a single security device that will enable authentication on VIP-enabled Web sites. mark for My Articles similar articles
InternetNews
July 8, 2005
Mike Harwood
Storage Security Basics In the first part of a series on storage security, we examine the fundamental concepts for securing storage area networks. mark for My Articles similar articles
JavaWorld
February 2002
Todd E. Sundsted
With Liberty and single sign-on for all An archipelago of disconnected authentication systems fractures your online persona into dozens or even hundreds of fragmentary identities. The Liberty Alliance Project seeks to solve this identity crisis with a single sign-on solution that will federate these independent authentication systems. But, will the benefits outweigh the costs? mark for My Articles similar articles
CFO
March 1, 2011
Carol E. Curtis
Rallying 'Round the Red Flags New identity-theft regulations apply to many kinds of companies, and some don't know that. mark for My Articles similar articles