Risk
9/21/2012
02:26 PM
Connect Directly
RSS
E-Mail
50%
50%

NIST Funds Trusted Identity Pilot Programs

National Institute of Standards and Technology programs are intended to create a trustworthy online environment for consumers and businesses, and for institutional transactions.

The National Institute of Standards and Technology has announced plans to award $9 million to five pilot programs as part of its National Strategy for Trusted Identities in Cyberspace.

NSTIC seeks to create a secure "identity ecosystem" for online transactions. The newly funded programs aim to improve consumer confidence in online transactions, prevent identity theft, and give people more control over their personal information.

The investments "will help protect our citizens from identity theft and other types of fraud, while helping our businesses, especially small businesses, reduce their costs," said NIST director Patrick Gallagher in statement on the grants.

The American Association of Motor Vehicle Administrators will implement a program, called the Cross Sector Digital Identity Initiative, to establish a secure online identity ecosystem. Its partners include AT&T, Biometric Signature ID, CA Technologies, Microsoft, and the Virginia Department of Motor Vehicles.

[ Federal intelligence agencies' venture investment firm In-Q-Tel looks to 10gen for data analysis. Read more at Intelligence Agency Invests In Big Data Management. ]

A team of companies led by Criterion Systems will let consumers share shopping and other online preferences and information. The pilot will pull together Web services from identity service providers, online auction services, financial services from Broadridge, supply chain management capabilities from General Electric, and first-response management at government agencies and health care service providers.

Grant recipient Daon will develop an identity ecosystem for senior citizens and other consumers that supports trusted interactions among multiple parties online. The pilot will include "user-friendly" identity technologies for smartphones and tablets. AARP is a partner in the program.

Resilient Network Systems plans to show how an encrypted "trust network" can be used for health and education transactions. On the education side, the pilot will demonstrate secure access to online learning for children that is compliant with the Family Educational Rights and Privacy Act and the Children's Online Privacy Protection Act.

Another grant recipient, the University Corporation for Advanced Internet Development, known as Internet2, will spearhead a program to build a privacy infrastructure that can serve communities. Brown University, Carnegie Mellon, Massachusetts Institute of Technology, University of Texas, and University of Utah are participating.

Cybersecurity, continuity planning, and data records management top the list in our latest Federal IT Priorities Survey. Also in the new, all-digital Focus On The Foundation issue of InformationWeek Government: The FBI's next-gen digital case management system, Sentinel, is finally up and running. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.