A Review of the Best News of the Week on Identity Management & Web Fraud

Ad scripts track users via browser password managers (Naked Security, Jan 03 2018)
Advertisers have adopted a sly new technique to track web users that can’t be stopped by private browsing, or even changing devices.

2017 – The year IAM Intelligence Became a “Thing” (Identropy, Jan 03 2018)
“If your IAM product doesn’t have intelligence, it should be out of the market.”

Australia’s Early Warning Signs to Online Gambling Worldwide (ThreatMetrix, Dec 28 2017)
Using bots, cyberthieves and organized crime rings hijack existing accounts, or create fraudulent new ones, by accessing more than 9 billion personal identity credentials stolen through data breaches and available on the dark web. In 2017, bot attacks made up 50 percent of all gambling site traffic during peak attack periods.

Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report

Reflections from Gartner IAM 2017 (ForgeRock, Jan 03 2018)
“Although their security, risk and compliance requirements were of vital importance to their project, their primary motive was to leverage digital identity to optimize their current customer relationships while acquiring new customers in the most cost effective and efficient manner possible.”

How reusing complex passwords gives your identity away (CSO Online, Jan 04 2018)
Researchers deanonymized anonymous Tor Mail accounts, raising awareness of the implications of reusing even complex passwords when creating an anonymous account.

Device Management with G Suite (JumpCloud, Jan 04 2018)
JumpCloud discusses how its platform integrates with G Suite, enabling IT admins to import G Suite user identities into the JumpCloud administrator console. Once imported, G Suite user identities can then be federated to IT resources throughout the network, including systems.

Managing Risk With Adaptive Authentication (The Duo Blog, Jan 03 2018)
CISOs now have to balance managing risk with multiple authentication factors against usability, and that’s where adaptive authentication comes in.