Blog

    

Neil Wilson

Recent Posts

Protect Your Data: Getting Ahead of the Next Privacy Breach

Posted by Neil Wilson on 2/26/14 4:01 AM

Last week’s news that hackers had gained unauthorized access to Kickstarter’s customer data was just the latest in an unfortunately expanding list of cybersecurity lapses affecting everyone from Forbes to the University of Maryland. According to Kickstarter CEO Yancey Strickler, compromised information included “usernames, email addresses, mailing addresses, phone numbers, and encrypted passwords” but no credit card data was accessed by the hackers.

Read More

Topics: Security Best Practices, Privacy and Preference Management

A Need for Modernization Leads to a Full-Service Solution

Posted by Neil Wilson on 2/20/14 3:00 AM

When prior vendors changed product features and ended support for existing product lines, Northern Arizona University (NAU) found that they were not getting the support or features needed to provide large scale authentication, authorization and information security for 30,000 faculty, staff, and student users. They began a search for a long-term solution focusing on scalability and reliability. “With three separate hardware clusters across two data centers providing capacity and fail-over for the University, it was important that we have a system to support growth, with extremely high reliability for our mission-critical infrastructure,” said Summer Steddom, Systems Integration and Architecture Team Lead.

The team at NAU researched several options, including open source products, but was concerned about the ability to get both scale and support. When they saw a demo for UnboundID, they realized that they could get all of their needs met. “The UnboundID solution has a large feature set – Lamborghini options compared to the Volkswagen-type features we were used to,” said Ms. Steddom. “The Identity Data Sync product allowed us to remove a lot of in-house custom code which had been developed to facilitate MetaDirectory functionality and complex account provisioning business rules. The ability to manipulate data transformation rules through a simplified interface rather than in source code saves a lot of time. The directory's schema validation is also much more thorough when adding, modifying, or importing data and has uncovered many attribute syntax issues that have been lurking in the background.”

Read More

Topics: Legacy IAM Modernization

A Conversation with the Center for Democracy & Technology

Posted by Neil Wilson on 2/12/14 3:00 AM

Recently UnboundID CEO Steve Shoaff spoke with Justin Brookman and Joseph Lorenzo Hall of the Center for Democracy and Technology (CDT) on the topic of Consumer Privacy. Brookman is the Director for CDT's Project on Consumer Privacy, and Hall is the CDT’s Chief Technologist. The CDT has been actively engaged in technology policy in the United States for 20 years, bringing technical expertise to public policy as well as coordinating working groups on topics such as Internet privacy, health privacy, free expression, copyright, and national security.

Read More

Topics: Consumer Identity and Access Management, Privacy and Preference Management

Excuse me... I Think Your App Is Leaking

Posted by Neil Wilson on 2/5/14 3:00 AM

Angry Birds have another reason to be extremely angry. Last week another chapter of the Edward Snowden saga was unveiled as The New York Times, The Guardian, ProPublica and others reported that the National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) have been secretly collecting users’ personal data from “leaky apps” such as Angry Birds, Candy Crush and Google Maps.

While users were crushing candy to help the crying dragon at Lemonade Lake, the NSA and GCHQ were apparently able to get the scoop on their private information, ranging from address books and telephone logs to their exact age, location, marital status and in some cases even sexual preference. The data gathered from smartphone apps was so rich that it was deemed the “golden nugget” of spy resources.

Read More

Topics: Mobile Apps, Privacy and Preference Management

Data Privacy Day - Busting Misconceptions About Privacy

Posted by Neil Wilson on 1/28/14 2:00 AM

January 28 is Data Privacy Day, an effort to empower and educate people to protect their privacy, control their digital footprint, and make the protection of privacy and data a great priority in their lives. We think it's the perfect time to present some of the misconceptions people may have about data privacy. This infographic contains research data that UnboundID and Create With Context have compiled - and you can read more about Consumer Data Privacy, Identity Etiquette, or Create With Context's Research and Design.

Read More

Topics: Privacy and Preference Management

Top 5 Data Privacy Predictions for 2014

Posted by Neil Wilson on 1/15/14 3:04 AM

Privacy was a hot topic in 2013, from Edward Snowden’s disclosures and WikiLeaks, to discussions around the privacy implications of the NSA programs, to the launch of new technologies like Google Glass. The arrival of a new year often prompts predictions – here are a few for 2014 from Harriet Pearson, Partner at Hogan Lovells, as well as a few from UnboundID CEO Steve Shoaff.

Read More

Topics: Privacy and Preference Management

Is That Mannequin Watching You?

Posted by Neil Wilson on 12/4/13 3:00 AM

“You can observe a lot by watching.” – Yogi Berra

It’s likely that the last time you shopped at Macy’s, Target, Cabela’s, Family Dollar, Benetton or Warby Parker, you were tracked. No, not online – retail brick-and-mortar stores are tracking customers as well. Retail location analytics technologies are being used by a variety of retail outlets to gather information on customer behavior via wireless signals, facial recognition, hidden cameras and even simple tactics like zip code gathering.

Wireless tracking technologies such as those offered by Euclid, Nomi, Wireless Werx, and Mexia Interactive provide brick-and-mortar stores with analytic data that’s quite similar to website traffic reports. These vendors offer technology that picks up the wireless signals from cell phones to provide retailers with data on how many customers pass by the store, how many enter, where they go inside the store, and how much time they spend at various locations within the store.

Read More

Topics: Customer Experience, Privacy and Preference Management

UnboundID LDAP SDK for Java 2.3.5

Posted by Neil Wilson on 11/22/13 10:21 AM

We have just released the 2.3.5 version of the UnboundID LDAP SDK for Java. You can get the latest release online at the LDAP website or the SourceForge project page, and it's also available in the Maven Central Repository.

There are a lot of improvements in this release over the 2.3.4 version. A full copy of the release notes for this version may be found on the LDAP website, but many of the improvements are related to connection pooling, load balancing, and failover, but there are other additions and a number of bug fixes also included in this release. Some of the most notable changes include:

Read More

Topics: Legacy IAM Modernization

Identity Etiquette: Good for Your Customers and Your Business

Posted by Neil Wilson on 11/6/13 9:22 AM

Last week, several of the UnboundID staff attended the TM Forum Digital Disruption event in San Jose. With over 1,000 attendees—40% of which represented service providers—we were able to speak with representatives from several global companies that are doing interesting things with data.

UnboundID also presented at the event on the concept of “Identity Etiquette”. Dave Birch, moderator of the event and Global Ambassador at Consult Hyperian, even named it the “phrase of the day.”

Read More

Topics: Data Management, Privacy and Preference Management

Keep it Simple, Stupid – Privacy Policies

Posted by Neil Wilson on 10/16/13 4:00 AM

When was the last time you read a privacy policy or terms of service? In the last app you downloaded there was a link to the privacy policy and buttons to accept or decline, remember? Tell the truth: did you read that policy? Odds are against it – and for good reason. No one has time to wade through the legal jargon and page after page of convoluted language about what they do with your data, except when they do something else.

Read More

Topics: Privacy and Preference Management