Recognizing the difference between a trend and a fad, and picking the right trends to invest in allows you to not be surprised and reactive, and allows for anticipation and correction of career and life trajectories.
2015 is the year of digital transformation, and many of the key trends such as instant gratification, mobile everything, business in the cloud, internet of things, health culture, re-imagined money and digital personal assistants all have cross-cutting needs for incorporating identity and privacy. Are you ready to an enabler?
++ And sometimes it is all about bringing people together. The next InCommon IAM Online is on Improving Security of Identities and Authentication and will feature speakers from the National Cyber Security Alliance, the FIDO (Fast IDentity Online) Alliance, and the National Strategy for Trusted Identities in Cyberspace.
Audits and Vulnerabilities
++ Truecrypt has been the go-to disk encryption program for many, and there has been a crowd-funded project to audit it. "The TL;DR is that based on this audit, Truecrypt appears to be a relatively well-designed piece of crypto software. The NCC audit found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances."
++ Critical vulnerabilities have been identified in multiple JSON Web Token (JWT) libraries with asymmetric keys which are used in protocols such as OpenID Connect. Important to note that this is not about the standard but about some particular implementations.
cyberforge: random and relevant
++ The deafening silence of one hand clapping.
++ Identity in New Zealand. My dream trip - geek out on identity, then backpack middle earth. One day ...