<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Authentication &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/category/authentication/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Mon, 26 Feb 2018 18:56:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>Authentication &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NIST&#8217;s Tougher Approach to Identity Risk</title>
		<link>https://telegrid.com/nist-identity-risk?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nist-identity-risk</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 14:52:53 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1597</guid>

					<description><![CDATA[<p>According to Verizon’s 2017 Data Breach Investigations Report (DBIR), &#8220;81% of hacking-related breaches leveraged either stolen and/or weak passwords.&#8221; The National Institute of Standards and Technology (NIST) understands this. This is why, I believe, they &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/nist-identity-risk">NIST&#8217;s Tougher Approach to Identity Risk</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: Arial;">According to Verizon’s 2017 Data Breach Investigations Report (<a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/">DBIR</a>), &#8220;81% of hacking-related breaches leveraged either stolen and/or weak passwords.&#8221; The National Institute of Standards and Technology (NIST) understands this. This is why, I believe, they are taking a tougher approach to identity risk than to other areas of network security. As proof I would point to the differences between the NIST 800-63 Digital Identity Guidelines and the NIST 800-30 Guide for Conducting Risk Assessments. NIST&#8217;s tougher approach to identity risk will require organizations to invest heavily in their Identity and Access Management (IdAM) infrastructures. </span></p>
<p>I know, I know, everybody loves a post about NIST guidelines. However, we thought this post was necessary due to the interest we received from our <a href="https://telegrid.com/nist-800-63-3">white paper detailing the updated NIST 800-63</a> and the number of views the accompanying <a href="https://www.youtube.com/watch?v=RFjPjqoR9eg">video has received on youtube</a>, which broke the record for most views of a non-cat, NIST video.</p>
<p>To give a brief background, the updated NIST 800-63 separates digital identity into Identity Assurance Level (IAL), Authenticator Assurance Level (AAL) and Federated Assurance Level (FAL). Within each Assurance Level, NIST defines 3 risk levels. The higher the level of risk the more restrictions that are placed on the organization (e.g., in-person vetting, multi-factor authentication, Holder of Key, etc.).</p>
<p>The main question that we receive from customers is, &#8220;How do I determine which Assurance Level applies to my organization?&#8221;</p>
<p>The NIST guidelines provide flow charts to help determine assurance level by judging risk on a scale of low, medium and high. If an organization judges any of the risks to be high (or medium for risk to Personal Safety) the Assurance Level is IAL3, AAL3 or FAL3 resulting in large IdAM changes for the organization.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<p>The problem with judging risk is that it is subjective. If asked to take the risk of financial loss or criminal violation wouldn’t we be risk-averse and select high? To alleviate this issue the guidelines point to NIST 800-30 which was designed to help organizations perform risk assessments in a more analytical manner.</p>
<p>While reviewing the 800-30 guidelines we were struck by a few core differences which we believe highlights NIST&#8217;s tougher approach to identity risk.</p>
<p>During a risk assessment NIST 800-30 guides organizations to view all elements of risk including threat, vulnerability and impact. However, NIST 800-63, &#8220;asks agencies to look at the potential <b>impacts</b> of a federation failure. In other words, what would occur if an unauthorized user could compromise an assertion?&#8221;</p>
<p>The reason this is important is that by focusing on impact without threat and vulnerability, organizations disregard several key points. For instance judging threat includes an assessment of who has the capability to perform the attack and do they have the desire to do so. Additionally judging vulnerability includes an assessment of existing security controls which may prevent the attack. Both threat and vulnerability serve to tamper the impact of an attack. If we only look at impact we will most likely take a tougher approach.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<p>Another example is the number of risk categories. NIST 800-30 recommends 5 risk categories with semi-quantitative values for each (e.g., Very High is 96-100 while High is 80-95). NIST 800-63 only has 3 categories, or 2 for Personal Safety. This reduces granularity and leads to the selection of higher Assurance Levels.</p>
<p>What is the reason for NIST&#8217;s tougher approach to identity risk? Perhaps it is that for all of the fear of hackers cracking firewalls, the DBIR proves that the majority of attacks are still due to stolen credentials and privilege misuse. By creating a subjective risk assessment model that skews towards higher Assurance Levels, perhaps NIST is telling organizations that they should invest more heavily in IdAM security. Perhaps organizations should pay attention.</p>
<p>&nbsp;</p>
<p align="justify">Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI, Multi-Factor Authentication (MFA) and secure embedded systems.</p>
<p><span style="font-family: Arial;"><br />
</span></p>
<p align="justify"><span style="font-family: Arial;">Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</span></p>
<p>The post <a rel="nofollow" href="https://telegrid.com/nist-identity-risk">NIST&#8217;s Tougher Approach to Identity Risk</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Authentication Token Cybersecurity and NIST 800-63-3</title>
		<link>https://telegrid.com/authentication-token-cybersecurity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=authentication-token-cybersecurity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 07 Dec 2017 15:29:02 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[mobile security]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1355</guid>

					<description><![CDATA[<p>In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/authentication-token-cybersecurity">Authentication Token Cybersecurity and NIST 800-63-3</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content">
<div class="entry-content">
<p align="justify"><span style="font-family: Arial; font-size: medium;">In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting the cybersecurity risks when using SMS for multi-factor authentication.  While the final version has not had as much focus, the truth is the new guidelines will cause the government, the military and many commercial organizations to re-architect their Identity and Access Management (IdAM) infrastructures and rethink their authentication token distribution methods.</span></p>
<p>The reason is that NIST 800-63-3 goes farther than its predecessor by covering all aspects of IdAM from initial risk assessment to deployment of federated identity solutions.  Whereas NIST 800-63-2 focused almost exclusively on credential type (i.e., soft or hard token), NIST 800-63-3 includes Assurance Levels for Identity Proofing (how the user applied for the token), Authenticator Type (the form of the token) and Federated Architecture (how credentials are passed internally).</p>
<p align="justify">Federated Assurance Level (FAL) is by far the most important change since it will have the largest effect on internal networks.  The reason NIST is so focused on FAL is that they have seen an increase in cybersecurity attacks that take advantage of how authentication tokens are passed from an Identity Provider to a Service Provider.  These attacks include Man-in-the-Middle, Compromised Tokens, and Denial of Service and are not specific to any one standard (e.g., SAML, OAuth, Kerberos, etc.).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p align="justify">To combat these cybersecurity attacks, the NIST guidelines now require that a user present a proof of key ownership in addition to an authentication token.  This was instituted for the most secure systems, those that are deemed FAL3, because relying solely on authentication tokens exposes the network.  The requirement to present a proof of key ownership is known as Holder of Key.</p>
<p align="justify">Holder of Key is not a new concept, however, the only standards based method to implement it is with PKI certificates and mutual TLS authentication.  This is an issue for organizations that either do not implement PKI or implement a Break and Inspect tool.  Break and Inspect refers to breaking a TLS connection between two parties in order to examine the secure contents of a message.  Break and Inspect is necessary because hackers typically hide their malicious activity within TLS traffic.  Once a TLS connection is broken, it is impossible to reestablish TLS with mutual authentication between the user and an application without also storing each user&#8217;s private key.  Storing every user&#8217;s private key is a HUGE cybersecurity risk.</p>
<p align="justify">Congress passed the Federal Information Security Modernization Act (FISMA) which created a requirement for federal agencies to manage information security based on publications that are developed by NIST.  In 2014 the DoD CIO, effectively joining federal agencies, issued Instruction 8510.01 replacing its own risk management process with NIST’s Risk Management Framework.  This made NIST’s Special Publication 800-63-3 a requirement of the Federal Government, the military, and most government contractors.  So, if you have not heard of NIST 800-63-3 and Holder of Key yet&#8230;you will soon.</p>
<p align="justify">If you currently implement Federated Identity or Single Sign-On (SSO) and are interested in getting more information on NIST 800-63-3 and Holder of Key, you should download TELEGRID’s <a href="https://telegrid.com/nist-800-63-3">white paper</a> on Authentication Token Cybersecurity and NIST 800-63-3 Holder of Key.  The <a href="https://telegrid.com/nist-800-63-3">white paper</a> provides information on specific authentication token cybersecurity attacks and how to seamlessly implement PKI even if you employ a Break and Inspect tool.  TELEGRID&#8217;s website also has helpful <a href="https://telegrid.com/identity-management-videos"> video tutorials</a> on NIST 800-63-3 to help organizations meet the new Digital Identity Guidelines.</p>
<p><span style="font-family: Arial; font-size: medium;"><br />
</span></p>
<p align="justify">Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p><span style="font-family: Arial; font-size: medium;"><br />
</span></p>
<p align="justify">Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
</div>
</div>
<p>The post <a rel="nofollow" href="https://telegrid.com/authentication-token-cybersecurity">Authentication Token Cybersecurity and NIST 800-63-3</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Active Directory Cyber Attacks</title>
		<link>https://telegrid.com/active-directory-cyber-attacks?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=active-directory-cyber-attacks</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Wed, 30 Aug 2017 13:06:06 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1132</guid>

					<description><![CDATA[<p>Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/active-directory-cyber-attacks">Active Directory Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your account privileges.  In the past few months though we have seen a shift towards more sophisticated Active Directory cyber attacks which take advantage of the nature of AD and other Authentication, Authorization and Accounting (AAA) servers.</p>
<p>AAA servers like AD and Radius servers are the central point for all access requests.  Anytime a user wishes to access an application, server, etc. their credentials are sent to a AAA server to determine whether they are legitimate (authentication) and are allowed access (authorization).  Depending on their configuration, the AAA server will also log access (accounting) although this is more commonly performed in commercial mobile networks.</p>
<p>Since the AAA server communicates with multiple applications and devices, across multiple security domains, it has become a prime target for botnet and denial of service (DoS) attacks.  Hackers and cybersecurity researchers have begun to take notice.  Let’s look at three examples.<br />
&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>&nbsp;<br />
First, IBM X-Force Research <a href="https://securityintelligence.com/qakbot-banking-trojan-causes-massive-active-directory-lockouts/">recently</a> identified a banking trojan virus, Qakbot, that locked out thousands of AD users.  Qakbot is financial malware and is typically used to drain online bank accounts.  This was the first time researchers have seen it used as a DoS attack by preventing users from accessing applications and devices.</p>
<p>Second, researcher Guido Vranken used fuzzing, where malformed data is injected into a software application, to expose several vulnerabilities in FreeRadius, the most popular open source RADIUS server.  As <a href="http://www.securityweek.com/code-execution-dos-vulnerabilities-found-freeradius">Security Week</a> pointed out, “The list of vulnerabilities includes memory leak, out-of-bounds read, memory exhaustion, buffer overflow and other issues that can be exploited to remotely execute arbitrary code or cause a DoS condition.”  Luckily the open source community was quick to address the vulnerabilities.</p>
<p>Third, at this year’s Black Hat conference, Threat Intelligence engineers gave a <a href="https://www.scmagazine.com/active-directory-botnet-sets-up-cc-infrastructure-inside-infected-networks-while-bypassing-defenses/article/677864/">talk</a> about a method to turn the AD Domain Controller into a botnet’s command and control server.  As they pointed out, the AAA architecture, where disparate computers take access instructions from a central controller, closely mimics that of a botnet.  If malware were installed it could take advantage of existing AD commands and user attributes to transfer information between infected clients and out of the network.  If there was only one AD domain controller for the entire network, this would allow data transfer between security domains.</p>
<p>For the moment many of these attacks can be prevented by patching, monitoring and constructing proper network architectures.  However, as the hacker community continues to turn its attention to AAA it is only a matter of time before widespread zero day Active Directory cyber attacks are unleashed.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/active-directory-cyber-attacks">Active Directory Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Should I protect my possessions or my identity?</title>
		<link>https://telegrid.com/protect-my-possessions-or-my-identity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-my-possessions-or-my-identity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 22:09:10 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=969</guid>

					<description><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to think about how much I pay each month to protect my physical possessions.  Then I wondered why I am willing to pay so much to protect a $500 TV but nothing to protect my digital identity.  This begged the question, if I had to choose, should I protect my possessions or my identity?</p>
<p>I believe that in order to answer this question properly we must make three comparisons:</p>
<ol>
<li>The average loss for a home burglary versus the average loss for an identity theft</li>
<li>The probability of a home burglary versus the probability of an identity theft</li>
<li>The cost of a home security system versus the cost of identity theft protection</li>
</ol>
<p>In its report on <a href="https://ucr.fbi.gov/crime-in-the-u.s/2014/crime-in-the-u.s.-2014/offenses-known-to-law-enforcement/burglary">Crime in the United States</a>, the FBI found that in 2014 the average dollar loss per burglary offense was $2,251.  This is higher than the average dollar loss for identity theft over the same time frame which was $1,343 according to the <a href="http://www.bjs.gov/content/pub/pdf/vit14.pdf">Department of Justice</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>However, when considering the number of occurrences, identity theft is far more likely than a burglary.  The DoJ reported 17.6 million cases of identity theft, or 7% of all US residents above the age of 16, in 2014.  This was 10 times more than the 1.7 million burglaries that were reported over the same time period by the FBI.</p>
<p>In terms of cost it is difficult to gauge exact figures based on the multitude of offerings for both home security systems and identity theft protection.  However, it seems that identity theft protection is the same or less per month than a home security system.</p>
<p>I understand that a home security system also provides the intangible value of personal protection and that there is no value that you can put on peace of mind.  However, I could counter that the majority of burglaries happen between the hours of 10AM and 3PM, when the homeowner is not home, and therefore personal protection has no inherent value.</p>
<p>So, should I protect my possessions or my identity? Based on this very simple statistical comparison it seems that, if I had to choose, I should protect my digital identity before I protect my physical possessions.  What would you pay to protect?</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI and Multi-Factor Authentication (MFA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>LinkedIn Phishing &#8211; Are your employees safe?</title>
		<link>https://telegrid.com/linkedin-phishing?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=linkedin-phishing</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 01 Nov 2016 15:21:57 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=866</guid>

					<description><![CDATA[<p>LinkedIn Phishing &#8211; Are your employees safe? It all started as a harmless exchange between like-minded adults.  It was something I had experienced many times before either at work or in the privacy of my &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/linkedin-phishing">LinkedIn Phishing &#8211; Are your employees safe?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4 style="text-align: center;"><span style="color: #ff6600;">LinkedIn Phishing &#8211; Are your employees safe?</span></h4>
<p>It all started as a harmless exchange between like-minded adults.  It was something I had experienced many times before either at work or in the privacy of my own home.  Normally I would not even have paid attention to it but it was what happened next that scared me.</p>
<p>I was at my desk when an email arrived with the familiar title, “Eric, please add me to your LinkedIn network”.  I normally ignore LinkedIn requests from people I don’t know but this one was different.  Alex was an executive at an oil &amp; gas company.  He had a complete profile and a picture of him riding a bicycle.  I do not know how he found me but I assumed he had read one of my amazing <a href="http://telegrid.com/cybersecurity-blog/">blog posts</a> ;).  Since he was in the oil &amp; gas industry and my company sells cybersecurity and wireless mesh networking tools to utilities I decided to click Accept.</p>
<p>The next night Alex sent me a message thanking me for accepting his request and telling me about an amazing opportunity to sell his company’s jet fuel.  Turns out he needed help in the US and the job would pay extremely well for only 5 hours of work per week.  Within the message was a link to a job offer and another link to an overview of his company.  Now “this ain’t my first rodeo” so I reported the message as LinkedIn Phishing and blocked Alex.  (On second thought I should have had the white hat hackers in my company reply with a link to lock his computer.)</p>
<p>The exchange left me wondering, are companies doing enough to protect against LinkedIn Phishing?</p>
<p>Companies train their employees to ignore phishing emails and deploy sandboxes to protect networks.  Companies also put in protections against Facebook Phishing, normally by blocking access since Facebook is not considered a work application.  However, LinkedIn is not email and it is not Facebook, it is a great tool that professionals use to expand their networks.  For this reason companies do not have LinkedIn Phishing protections but rather encourage their employees to connect with as many people as possible.</p>
<p>So what can companies do?</p>
<p>Since this came over the LinkedIn messaging system it is unlikely that it would have been caught by a spam filter, and, even if it was, an employee could still access the message from the LinkedIn website. This means that in order to prevent LinkedIn Phishing a company would have to block all of LinkedIn.  Additionally, this was not a bulk email phishing attempt that could be tracked, but rather a concerted spear phishing effort by someone who connected one day and then came back the next day to phish.  LinkedIn could solve this problem, and I am sure they are working on it, but until then the only solution seems to be employee training.</p>
<p>Or, I could be completely wrong, Alex is real, and I just missed the opportunity to get into the fast growing jet fuel market.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI and Multi-Factor Authentication (MFA).</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/linkedin-phishing">LinkedIn Phishing &#8211; Are your employees safe?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ryan Lochte and Cybersecurity Sales</title>
		<link>https://telegrid.com/ryan-lochte-cybersecurity-sales?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ryan-lochte-cybersecurity-sales</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 15 Sep 2016 17:49:39 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=607</guid>

					<description><![CDATA[<p>What Ryan Lochte Can Teach Us About Selling Cybersecurity Tools</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ryan-lochte-cybersecurity-sales">Ryan Lochte and Cybersecurity Sales</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;">By now we all know the story of Ryan Lochte and his &#8220;over exaggeration&#8221;. Never one to miss an opportunity to relate current events to cybersecurity I thought I would write about the cybersecurity sales lessons that we can learn from this unfortunate event.</p>
<p style="text-align: left;"><strong>Stop &#8220;Over Exaggerating&#8221; to Scare Your Customers</strong></p>
<p>In most organizations cybersecurity sales&#8217; rule #1 is to scare potential customers. Salespeople &#8220;over exaggerate&#8221; by telling customers the barbarian hordes are at their gates and if the customer does not buy the solution today then they will lose hundreds of millions of dollars. Then salespeople back up their claims with impressive statistics like 110% of people were compromised by the exact problem that our solution resolves. As Homer Simpson once said &#8220;you can come up with statistics to prove anything. Forty percent of all people know that&#8221;.</p>
<p>The truth is that your customer knows the statistics and they understand the risks. Don&#8217;t sell to customers by fear mongering but rather by inspiring. Just last week a customer referred to TELEGRID&#8217;s <a href="http://telegrid.com/privileged-access-management/"> Privileged Access Management</a> tool as &#8220;elegant&#8221;. That is what you want to hear.</p>
<p>Show your customer how easy your solution is to install, how it will make their day-to-day job easier and most importantly how it will promote network best practices. Considering how many attacks are from an employee doing something they shouldn&#8217;t, network best practices are extremely important.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p style="text-align: left;"><strong>Your Bathroom is as Important as Your Point of Sale System</strong></p>
<p>When selling a cybersecurity tool salespeople should consider the impact of integrating it into a network. For instance enabling two-factor authentication requires the install of an agent on every application or host device. This forces customers to make difficult decisions about what should and should not be secured.</p>
<p>The first applications to be secured are always those that handle Personally Identifiable Information (PII). These applications are important but so are the &#8220;non-critical&#8221; applications. How would your organization fair if it was the victim of a ransomware attack on its inventory database or client relationship management system. Salespeople should consider these gaps and help customers to resolve them.</p>
<p>Taking it back to Ryan Lochte&#8217;s alleged incident, I bet that gas station owner in Brazil sent all of his credit card data securely and that his cash register had a lock on it. He even paid to have security guards protect the premises 24/7. What he could not afford to protect was his bathroom and we all know how that ended. Ok that might be a stretch but you get my point.</p>
<p>In my <a href="http://telegrid.com/2016/08/why-is-cybersecurity-so-slow/"> last post </a>I discussed how we need to rethink cybersecurity tools from a security AND network performance standpoint. I think we also need to rethink how we sell cybersecurity tools.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ryan-lochte-cybersecurity-sales">Ryan Lochte and Cybersecurity Sales</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why is Cybersecurity So Slow?</title>
		<link>https://telegrid.com/why-is-cybersecurity-so-slow?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-is-cybersecurity-so-slow</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 19 Aug 2016 14:16:09 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[network performance]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=536</guid>

					<description><![CDATA[<p>Do cybersecurity vendors consider user experience?  We need to start designing solutions based on both network protection AND network performance.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Two weeks ago I attended a US Military tradeshow that showcased the latest and greatest cybersecurity technologies.  As I sat and listened to the presenters the same question kept popping into my head.   It is a question that has bothered me for some time and no vendor has been able to answer appropriately.  I hit my breaking point when I heard a presenter discuss his company’s ability to put every packet in its own tunnel as part of something they call the Romulan cloaking technique (example of a bad analogy).  So, after the presenter finished I raised my hand and asked my question, looking for King Arthur to extract the proverbial Excalibur from my brain (example of a good analogy).</p>
<p><span style="color: #ff6600;"><strong>“WHAT ABOUT LATENCY?”</strong></span></p>
<p>Three simple but powerful words that show where cybersecurity has started to go wrong.  How can you put every packet in its own tunnel without massively affecting network performance?  Does user experience even matter anymore?</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Is it just me or are new cybersecurity products just rehashes of old cybersecurity products?  We have gone from 128 bit encryption to 256 bit encryption.  We have gone from endpoint protection to advanced endpoint encryption.  We have gone from firewalls to next generation firewalls.  We have gone from deep packet inspection to deeper packet inspection to deepest packet inspection.  It is the same thing Hollywood did when they remade the greatest films of our generation like Ghostbusters and Vacation.</p>
<p>Do vendors stop and think about the effect they are having on network performance?  Indeed a Cisco survey found that <u>71% of Chief Executives think that cybersecurity slows down the pace of commerce</u>.  So how are vendors improving cybersecurity without affecting latency?  The answer seems to be more blade servers, faster processors, and ASICs.  This may work but it also translates into higher costs for the customer.  Are cybersecurity vendors starting to price themselves out of the market?</p>
<p>We need to rethink cybersecurity.  We need to start designing solutions based on both network protection AND network performance.  We need to look at our network from a holistic standpoint and identify existing tools that we can use for cybersecurity.  Let’s call it Cybersecurity 3.0!  (I know we skipped 2.0 but I was at a social media talk last week and the speaker used the term Web 3.0 so cybersecurity needs to catch up.)</p>
<p>In the next few weeks TELEGRID will be launching the first Cybersecurity 3.0 product which promises to turn the field of authentication on its head.  If you are not on it already then<strong> <span style="color: #ff6600;"><a style="color: #ff6600;" href="http://telegrid.com/join-mailing-list/">Join Our Mailing List</a> </span></strong>so you do not miss the release.  In the meantime if you are looking for a secure authentication tool give me a call at 973-994-4440 and I will give you a sneak peek.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does the death of the CAC mean the death of PKI?</title>
		<link>https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=does-the-death-of-the-cac-mean-the-death-of-pki</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 18 Jul 2016 20:08:30 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[common access card]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[public key infrastructure]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=516</guid>

					<description><![CDATA[<p>The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years.  If there is no more CAC how can the DoD maintain its PKI?</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki">Does the death of the CAC mean the death of PKI?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><meta name="keywords" content="common access card, common access cards, cac future, cac going away, authentication, authorization, public key infrastructure, military pki" /></p>
<p>Last month the Department of Defense Chief Information Officer Terry Halvorsen made a bold call for the <a href="http://federalnewsradio.com/defense/2016/06/dod-plans-bring-cac-cards-end/">replacement of Common Access Cards</a> within the next two years.  Common Access Cards, or CACs, are credit-card-sized smartcards used to provide Two-Factor Authentication (2FA) to DoD networks.  This method of access requires two out of three of the following items:</p>
<ul>
<li>Something the user knows</li>
<li>Something the user has</li>
<li>Something the user is</li>
</ul>
<p>A CAC – “something a user has” &#8211; in conjunction with a PIN – “something a user knows” – provides the required 2FA.  The issue Mr. Halvorsen has with CACs is that they do not work well in a tactical environment.  As he said, “It’s really hard to issue CAC cards &#8230; when people are dropping mortar shells on you and you need to get in your systems.”</p>
<p>So what will we use instead of CACs?  Mr. Halvorsen mentions Biometrics as part of the solution.  Biometrics, or “something the user is”, includes physical characteristics like fingerprints or behavioral characteristics like how many times a user misspells Halvorsen in a blog post (purely hypothetical).  I discussed some of the security concerns surrounding Biometrics in a <a href="http://telegrid.com/2016/05/assured-identity-giving-apps-the-finger/">previous post</a> but the biggest issue seems to be with public key cryptography.  In public key cryptography the user maintains a secured private key and shares a public key with the world.  The private key is stored on the CAC and is unlocked with a PIN as part of the DoD Public Key Infrastructure (PKI).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>If there is no more CAC, does that mean there is no more private key?  We can derive passwords from Biometrics, for instance fingerprints have enough entropy for the equivalent strength of a <a href="http://lukenotricks.blogspot.com/2009/04/on-entropy-of-fingerprints.html">13 character password</a>, but it is not public key cryptography.  If there is no more public key cryptography how can the DoD maintain its PKI?</p>
<p>I believe this highlights a very interesting debate on the difference between authentication and encryption.  If we look back at the earliest days of authentication, passwords were often sent in the clear (e.g., Password Authentication Protocol (PAP)).  It was assumed that the channel would be encrypted and all information, including passwords, would be encrypted by the channel.  Authentication was merely used for authorization and accounting.  It was not until we moved from point-to-point networks to the Internet that we combined authentication and encryption in PKI.  Is Mr. Halvorsen telling us that we no longer need PKI?</p>
<p>I do not believe this is the case because at a <a href="http://federalnewsradio.com/reporters-notebook-jason-miller/2016/06/halvorsen-firing-effect-calling-end-cac/">luncheon</a> following the CAC elimination comment Mr. Halvorsen made a point of recognizing the need for PKI.  As he said, “I want to make it clear, when we replace the CAC card, it will be public-key infrastructure.”   Mr. Halvorsen suggested using Derived Credentials in conjunction with Biometrics to simplify authentication and maintain PKI.  Derived Credentials is a software-based version of the CAC contained in an electronic device such as a smartphone.  In that architecture Biometrics would unlock the electronic device while a user’s certificate and associated private key would be stored in the Derived Credentials.</p>
<p>Derived Credentials is intriguing because it heralds the ability to Bring Your Own Device (BYOD).  The only issue is current policy (i.e., NIST 800-157) which requires that credentials issued at Level of Assurance (LOA) 4 be kept in a hardware cryptographic module that has been validated to FIP 140-2 Level 2.  This means you may need a special hardware solution which is an issue for BYOD.</p>
<p>The moral of the story is that the DoD is now committed to changing how users authenticate themselves and that we should expect to see big changes in the next few years.  This will make it difficult for the Government to purchase devices or applications that have a fixed authentication mechanism.  Perhaps this is the reason we are seeing so much interest in applications that allow a flexible authentication mechanism, like TELEGRID’s <a href="http://telegrid.com/authentication-authorization/">SMRTe</a>.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki">Does the death of the CAC mean the death of PKI?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Assured Identity – Giving Apps the Finger</title>
		<link>https://telegrid.com/assured-identity-giving-apps-the-finger?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=assured-identity-giving-apps-the-finger</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 02 May 2016 15:29:53 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=385</guid>

					<description><![CDATA[<p>I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility.  The DoD’s Public Key Infrastructure (PKI) is well established as &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/assured-identity-giving-apps-the-finger">Assured Identity – Giving Apps the Finger</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility.  The DoD’s Public Key Infrastructure (PKI) is well established as is the use of two-factor authentication via a Common Access Card (CAC).  However, with the proliferation of mobile devices, CAC readers have gone out of favor.</p>
<p>The DoD has been searching for other methods of ensuring two-factor authentication including Derived Credentials but smartphones’ use of software encryption precludes the use of Derived Credentials with certain types of information (NIST 800-157).  There has also been research at organizations including DARPA into alternate forms of authentication like the way a user walks or the way they type on a keypad (i.e., Behavioral Biometrics).  These technologies are still being tested and the method of securely transmitting the information to a smartphone (e.g., Bluetooth) has not yet been determined.</p>
<p>But what about standard Biometric authentication, like fingerprint recognition, which was just highlighted in President Obama’s <a href="https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan">Cybersecurity National Action Plan</a>, and is already included in many smartphones?  Indeed, I recently reviewed a solicitation that included a requirement for user authentication via an Apple device’s Touch ID.  As with every security related solicitation TELEGRID engineers cross referenced the requirements against the Security Technical Implementation Guides (STIGs).  In this case we found that Apple’s Touch ID cannot be used and must be disabled because, according to the Apple iOS 9 Interim STIG, “Many mobile devices now permit a user to unlock the user&#8217;s device by presenting a fingerprint to an embedded fingerprint reader….they are significant potential vulnerabilities to DoD information and information systems. Disabling them mitigates the risk of their use.”<br />
&nbsp;</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>&nbsp;<br />
We all know fingerprints can be “lifted” (we have all seen CSI) but I always thought it was an extremely difficult task considering that fingerprints can easily be smudged and iOS has security features in place to prevent multiple incorrect attempts.  But, then I found this <a href="https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands">article</a> from 2014 about a security conference where a hacker named Starbug displayed copies of German Defense Minister Ursula von der Leyen’s fingerprint.  The reason the name Starbug might ring a bell is that he was also the person who hacked the Touch ID within 24 hours of its release.  The amazing thing about this effort was that the hacker copied the fingerprint from high resolution photographs of the Defense Minister.  Starbug did not even need to be near the Defense Minister to copy her fingerprints.</p>
<p>Now we understand the investment in Behavioral Biometrics and the potential they have for securing two-factor authentication.  Until they are approved, however, I will continue to use my wedding anniversary date as my password because, if I can’t remember it, what are the chances of a hacker stealing it?</p>
<p>Interesting side note: I came across this <a href="http://blogs.wsj.com/digits/2014/10/31/judge-rules-suspect-can-be-required-to-unlock-phone-with-fingerprint/">court case</a> when I was doing research for this post.  I did not know how to include it but thought it was worth a mention.  In 2014 a Virginia court found that the police can force you to surrender your fingerprints in order to unlock your phone.  According to Judge Frucci, a fingerprint is physical and therefore is like your DNA, which must be provided, as opposed to a memorized password pin which does not have to be provided since it falls under your Fifth Amendment right to avoid self-incrimination.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/assured-identity-giving-apps-the-finger">Assured Identity – Giving Apps the Finger</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
