Tag: Identity Theater
-
call for comment on NIST draft: Establishing Confidence in IoT Device Security: How do we get there?
Last week’s NIST cybersecurity white paper came across our desk and we’re reading up. Establishing Confidence in IoT Device Security: How do we get there? The abstract model from Figure 1 is useful for organizing work from the vantage of stakeholders. Aspects: functional, business, human, timing, data, boundaries, composition, lifecycles, and communication. Concerns: safety, privacy,…
-
IIW topics that excite us
We talked about this week’s Internet Identity Workshop (#32!) on one of our team calls. What sessions would make us jump out of our seat? Our short list. Rugged identity for IoT. Nearly all identity systems break with power outages, network interruptions, really long latency, really low bandwidth, and device tampering. HADI maturity models. How…