twitter

Secure ID Coalition Blog

Privacy and Security Standards are Crucial to the Success of the Internet of Things

Today it seems like you can't browse a tech website or listen to a corporate CEO speak without hearing about the Internet of Things. And for good reason. As many commentators argue, the Internet of Things (IoT) has the potential to dramatically reshape our daily lives, bringing convenience and efficiency that otherwise would have been limited to the realm of science fiction. 

However like all major innovations, the Internet of Things carries risks – particularly when it comes to privacy and security – and in recent weeks, several articles and organizations have highlighted the need for universally-recognized standards. We believe that it is absolutely crucial for all IoT-related standards to incorporate privacy and information security provisions to protect consumers.

 

SIDC Announces its Sponsorship of the 2015 connect:ID Conference

The Secure ID Coalition (SIDC) is thrilled to announce its participation in the 2015 connect:ID conference in Washington, D.C. on March 24-25. The SIDC is affirming its commitment to secure, privacy-enhancing technology solutions through its participation in the event as a Premier Partner.

 

Health Data Breaches: Does the Federal Government Already Have the Authority to Begin Fixing the Problem?

Wednesday evening, Anthem, the second largest health insurance company in the United States, revealed that it had suffered a massive data breach. Anthem covers one in nine Americans and, as The Washington Post reports, this may amount to the largest data breach yet at a major insurance company. The problem with cybersecurity at many large organizations is that it doesn't easily factor into the cost-benefit risk analysis that executives use when making decisions to allocate time and money. And that's a problem.

 

Data Privacy Day 2015: Highlighting the Importance of Data Stewardship

Virtually everyone would agree that organizations that collect, store, and access personal data should be held responsible in the event that the data is improperly accessed or released, from companies collecting data on digital consumers and governments collecting data on digital citizens. Nevertheless, the cultural norms and legal infrastructure necessary to promote responsible data stewardship are still in their infancy, and many executives and administrators have a difficult time justifying cybersecurity expenses that add little to the organization's bottom line over the short term.

 

GSA SmartPay Program Sets a High Standard for Security

The General Services Administration (GSA), the federal agency responsible for coordinating payment card distribution across the federal government, has launched the GSA SmartPay Program to secure federal payment cards secured with chip-and-PIN technology and save taxpayer dollars.

This is exciting news for payment authentication because, while most U.S. banks have announced that they will be issuing less secure ‘chip-and-signature’ credit cards, the federal government will set an important example by issuing all of its payment cards using the more secure ‘chip-and-PIN’ protocol. U.S. financial institutions should follow the SmartPay program’s lead and reduce payment fraud by issuing chip-and-PIN cards.

 

Secure Smart Cards & Mobile Payments: Innovation for Today…and Tomorrow

Today, The Hill published the Secure ID Coalition's response to Daniel Castro's recent op-ed describing chip-enabled smartcards as an "old" and "outdated" technology. Mr. Castro, of the Center for Data Innovation, could not have been more wrong. Chip & PIN, delivered on a smart card, is the only mature secure payment technology that has successfully protected tens of millions of consumers from actual fraud and identity theft. One day, mobile payments will be a convenient secure way to help consumers conduct their financial transactions, but this emerging technology has many years of development, standardization and interoperability ahead.

You can read our full response by clicking here.

 

Page 3 of 13

Learn How