Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:06 PM
Taher Elgamal
Taher Elgamal

On To 2011

2011 will be the year we catch the first glimpse of the biometric movement

So here we are at the end of 2010, 15 years after e-commerce started and at what is probably a good checkpoint for not only taking stock in what’s happening in the IT security industry now, but considering what we need to enhance and work on incrementally.

The user authentication issue still hasn't been solved in any effective way, but I expect 2011 to be the year some serious attempts are made -- by separate players -- to add an identity component in the fight against e-commerce’s perennial fraud issues. (It's already happening now to some degree with PCI DSS, for example, where separate players are investing their time and resources to make improvements.)

As a footnote to my last blog post, I'll say I expect 2011 will be the year we catch the first glimpse of biometric movement in the industry.

Of course, for something as game-changing as biometrics, it will take a lot of work -- from a lot of parties -- to be successful.

But if those parties can actually pull it off, if they can actually create a fingerprint sensor and connect it to an application on the Web using the right middleware, they just might have the beginning of what I believe could be a new, sustainable security industry, one that uses explicit biometric authentication for individuals. Enterprises could then modify that product to suit their needs.

In any event, it's imperative that 2011, in some significant way, inches us forward to the goal of not bothering people while they're conducting commerce on the Internet -- of not interrupting their momentum to actually buy things -- by having a single, explicit authentication from which we can infer identity, guarantee fraud isn’t being committed, and wrap our arms around e-commerce issues.

Predicting what 2011 will bring us is a tall order. But I do believe, simply from my discussions with colleagues and watching what's going on, many grassroots operations addressing these authentication concepts are currently in play, and that 24 months won't pass before they start to take a truly palpable form.

PKI, on the other hand, I do not expect to make much progress in 2011.

Consider the PKI dilemma. It will probably continue to be a dilemma because it's an infrastructure that needs to be promoted. There are some areas in the world where PKI has started, but it's not obvious whether a universal PKI will come to pass. The one-time-password type of authentication will continue to exist for quite a long time because a lot of back ends depend on it and, obviously, it's much better than having a password. Additionally, we'll start to see an overlay of these things on top of each other maybe phasing something in or phasing something out.

It took 15 years to get here, so it's not going to take us just one year to advance any one of these things a whole lot. But I predict we will start to see the beginning of a real evolution, if not a bona fide revolution, in 2011.

Recognized in the industry as the "inventor of SSL," Dr. Taher Elgamal led the SSL efforts at Netscape. He also wrote the SSL patent and promoted SSL as the Internet security standard within standard committees and the industry. Dr. Elgamal invented several industry and government standards in data security and digital signatures area, including the DSS government standard for digital signatures. In addition to serving on numerous corporate advisory boards, Dr. Elgamal is the Chief Security Officer at Axway, a global provider of multi-enterprise solutions and infrastructure. He holds a Ph.D. and M.S. in Computer Science from Stanford University. View more of his blog posts here.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.