Updates, Information, Blog

We are happy to give you some more and detailed information.
(latest news up)

 

PRIVACY POLICIES AND PRACTICES as they apply to the design and deployment of OnliU Privacy is a dominant concern in every phase of the On!iUs operation and especially for OnliU. Details ...

---

OnliU WILL REVOLUTIONIZE HOW WE VIEW INFORMATION ECOSYSTEM SECURITY - For decades information ecosystem security has been built around shared secret static information in the form of passwords. Read more ...

INTO THE BREACH WITH OnliU INSTANT RECOVERY - After a massive breach one of the major steps to take is to change all of the user passwords. This monumental task may include notifying millions of user and take weeks or even months. Read more ...

INTERNET OF THINGS (IOT) - It is not a question of if an information ecosystem will be breached through smart devices, or even when; the primary security question is “How will the breach be handled?” Read more ...

THINKING ABOUT SYSTEM SECURITY - If your security system is stronger than any out there, if it is 99.9999% safe, there is nearly a 100% chance that attackers are already in your information system. Read more ...

The System Security Emperor has no clothes! Yet we promote Identity Access Management systems that assume that if they are only strong enough they can keep the attackers out. The truth is that it is too late for that approach. The attackers are already embedded in our most secure systems. Read more ...

THE ONLIU INSTANT RESET - OnliU is an IAM system that largely operates in the background providing the strong security of a certificating authority, but with certificates that are dynamic and continually change. Read more ...

THE FUTURE OF INSECURITY - As we move to include more mobile devices and into the Internet of Things, our ability to set security standards and enforce them will become increasingly challenging. Read more ...

Think of a strong lock. In the digital world that strong lock is a complex password that you change every 90 days. Read more ...

STATIC OR DYNAMIC AUTHENTICATION? Imagine if you had to change your user name and password every time you logged in to every system you log into. Read more ...

STOLEN CREDENTIALS AND DATA BREACHES: For centuries conventional wisdom assures us that if we only build the wall strong enough we can keep the attacker out. The reality in the digital world of the 21st century, is that the bad guy is probably already inside our fortress. Read more ...

THE DEMISE OF THE SHARED SECRET PARADIGM: The simplest form of a shared secret is a password. Read more ...

The Challenge to the Encryption Paradigm: The purpose of encryption is to effectively mask the content and meaning of a message so that only the trusted communicators can write, read and understand the message. Read more ...

WHY 21ST CENTURY CROOKS BEAT 20TH CENTURY SECURITY. Read more ...

The most common password of last year is "123456," which sadly probably isn't a surprise considering statistically there's a good chance that's your password. Read more ...

DIGITAL SECURITY: Digital systems are kind of like banks. If you want a bank that can’t be robbed you build it without windows or doors. The problem with that design is that it also keeps the employees and customers out. Read more ...

THE PARADIGM SHIFT: We recognize that we operate in an imperfect and at time dangerous digital environment. Read more ...

The Power of a Utility Bill – The True Breeder’s Cup: Many identity systems today use prior government issued credentials as a means of verifying identity for the issuance of subsequent and seemingly more secure credentials. This is a tale of the flaws in that approach. Read more ...

WHY IDENTITY THIEVES ARE WINNING THE FIGHT: The bad guys understand identities and identity system much better than the so-called experts that design and operate them. Read more ...

Attacker being welcomed: Most attacks are not attempts to break down our firewalls or to crack encryption or complex passwords. The attacker being welcomed in and treated as a trusted member of the team accomplishes most attacks. Read more ...

 

Back to Home

 

© 2016 On!iUs Inc., 15250 Heather Mill Lane, Haymarket, Virginia 20169, USA. All Rights Reserved.