Security shield

The Open Group Zero Trust Initiative and The President’s Executive Order on Improving the Nation’s Cybersecurity

The Open Group, an international vendor- and technology-neutral standards and certification consortium, has been actively engaged in establishing a consistent and coherent vision of Zero Trust and Zero Trust Architecture across industry, academia, and governmental organizations for the last two years. In fact, The Open Group pioneered the underlying principles behind Zero Trust, under the aegis of the Jericho Forum® and the guidance that came from the Jericho Forum over the past two decades, including the Jericho Forum Commandments and Jericho Forum Identity Commandments.

Architecting for Secure Business Collaboration

The Open Group Framework for Secure Collaboration Oriented Architectures (O-SCOA) Guide provides system and security architects and designers with a blueprint specifying the requirements for secure design of enterprise architectures that support safe and secure operation, globally, over any unsecured network.

Data Protection Today and What’s Needed Tomorrow

Technology today allows thieves to copy sensitive data, leaving the original in place and thus avoiding detection. Published in October 2012, the Jericho Forum® Data Protection white paper reviews the state of data protection today and where it should be heading to meet tomorrow’s business needs.

Call for Submissions

The Open Group Blog is celebrating its second birthday this month! While several members and Open Group staff serve as regular contributors, we’d like to take this opportunity to invite our community members to share their thoughts and expertise on topics related to The Open Group’s areas of expertise as guest contributors.

Key Concepts Underpinning Identity Management

Today, the lack of trust in online Identity forces organizations to set up their own identity management systems, dishing out their own usernames and passwords/PINs for us. The result is that we end up having to remember well over 50 different online identities, which poses a large problem.

Challenges to Building a Global Identity Ecosystem

In this fifth video – Building a Global Identity Ecosystem – we highlight what we need to change and develop to build a viable identity ecosystem. The Internet is global, so any identity ecosystem similarly must be capable of being adopted and implemented globally.

This means that establishing a trust ecosystem is essential to widespread adoption of an identity ecosystem. To achieve this, an identity ecosystem must demonstrate its architecture is sufficiently robust to scale to handle the many billions of entities that people all over the world will want, not only to be able to assert their identities and attributes, but also to handle the identities they will also want for all their other types of entities. It also means that we need to develop an open implementation reference model, so that anyone in the world can develop and implement interoperable identity ecosystem identifiers, personas, and supporting services.

Entities and Entitlement – The Bigger Picture of Identity Management

In this fourth “Entities and Entitlement” video, we explain the bigger picture – why identity is not just about people. It’s about all things – we call them “entities” – that we want to identify in our digital world. An identity ecosystem doesn’t stop at just “identity,” but also involves “entitlement” to access resources, which includes the identity of the owners of those resources who will wish to exercise controls (rules) over who is entitled to access their resources and for what purposes.

The Open Group and MIT Experts Detail New Advances in ID Management to Help Reduce Cyber Risk

Jim Hietala, vice president of security at The Open Group; Thomas Hardjono, technical lead and executive director of the MIT Kerberos Consortium; and Dazza Greenwood, president of the CIVICS.com consultancy and lecturer at the MIT Media Lab explore how the technical and legal support of ID management best practices have been advancing rapidly. All panelists will be speaking at The Open Group Conference in Washington, D.C. For more information on the conference, please visit: http://www.opengroup.org/dc2012

What’s the future of information security?

Today, Jan. 28, is Data Privacy Day around the world, and a time to think about organizational and global challenges relating to data security. What is your organization’s primary cybersecurity challenge? Take our poll and read on to learn about some of The Open Group’s resources for security professionals.

Cybersecurity in a boundaryless world

The core dilemma in public cybersecurity: Balancing boundarylessness and data security. The solution isn’t easy, but long-term, it lies in not relying on the security of the pipes or the perimeter, but improving the trust and security of the data itself. Security needs to be associated with data and people; not the connections and routers that carry it.