Privacy and the 7 Laws of Identity

In 2005, the late Kim Cameron penned “The Laws of Identity.” The paper explored how to give internet users a deep sense of safety, privacy, and certainty about their interactions online. With the proliferation of web-based services and applications, it was essential to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail. Nearly 20 years later, Cameron’s seven laws of identity are still applicable today. 

Published shortly after the dot-com bust and the introduction of social media, this paper came at a point of inflection for the Internet. Today, with the promise of Web3, a metaverse, and adjusting to a largely virtual working world, we’re living through a similar shift in history. For both points in time, digital identity is at the epicenter—and it’s worth remembering some tried and true lessons from the past.

The Rise of Cybercrime – An Overview

Cybercrimes are more rampant in the year 2022. The rate of cybercrimes is increasing every year, and it is expected to reach its highest next year. It is said that cybercrime affects the security of more than 80% of businesses throughout the world today. It is mainly due to the limited capabilities of authorities in monitoring cyberattacks because this type of crime is performed using the virtual world.

According to the cybersecurity stats, more than half of cyberattacks are done through ransomware attacks. The statistics further stated that healthcare databases are the most targeted because of their importance to businesses. In addition, social media websites are also abused to spread malware and viruses or compromise sensitive information.

Ransomware as a Service: The Trending Business Model for Attacks

Ransomware as a Service (RaaS) is the new and trending business model for ransomware attacks. It’s a decentralized and mostly automated mode of distribution to support the fast-growing demands of ransomware operators.

Currently, the attackers behind ransomware campaigns are constantly looking for ways to maximize profit (and minimize the effort). The RaaS framework can be used by anyone, even without any coding skills, as it provides essential tools to implement encryption and communication with command-and-control servers quickly.

What New Zealand’s Privacy Act 2020 Means for APIs

On December 1st, 2020, New Zealand’s revamped privacy act went into effect. The Privacy Act originally passed in 1993 and has been revisited multiple times, but the 2020 act clarifies its reach and outlines what organizations need to do in order to be compliant.

In addition to updating the original privacy act, Privacy Act 2020 also expands the office of the National Privacy Commissioner that can receive complaints from individuals, investigate privacy concerns, require organizations to make changes to their operations, and even impose fines on organizations not in compliance.

GDPR Tips and Best Practices

Under the new GDPR, businesses are called on to standardize how they handle personal data. It’s also an opportunity to get your systems and processes ahead of the next regulation.

GDPR—the European Union’s General Data Protection Regulation—will come into effect on May 25, 2018. While the fines—up to approximately $24 million or 4 percent of annual profit—are enough to make businesses take notice, the new regulations highlight a new way of handling security and privacy that will impact how all businesses process and manage personal data going forward.

DataSecOps: Leveraging DevSecOps Principles for Secure Data Analytics

If you’re a developer, software tester, or IT Ops admin, you probably know all about DevSecOps. But what if you’re a data analyst? Do you feel left out of the DevSecOps revolution?

If so, you have not yet heard of DataSecOps. DataSecOps an approach to data analytics and storage that allows data engineers to benefit from the same principles and philosophies that the DevSecOps movement emphasizes.