In light of the recent Equifax breach, Gene Kim and speakers from the upcoming DevOps Enterprise Summit San Francisco (DOES17) dissected the situation and discussed the technical leadership lessons learned while offering their own expert advice for handling crisis situations. The following are more highlights from the discussion ...
IBM announced a new service on Bluemix, IBM’s developer platform, which allows developers who are not security experts to easily build third-party security authentication into their apps.
The new service, Bluemix App ID, allows users to login with existing social media credentials, such as Facebook or Google, while saving the developer the time and effort typically required to configure this additional security layer. It also helps developers to manage data around each specific person using their app, allowing them to more easily build personalized experiences for users.
App owners typically want to increase app registrations and ongoing usage by giving their user base a trustworthy security model, which ideally doesn't force them to create new credentials. Enabling users to access an app with online social credentials they are already familiar with gives them a smoother experience, while minimizing password fatigue.
Additionally, App ID gives developers the ability to store data around each specific user, arming them with the intelligence needed to build customized experiences for each app user. Developers can alter each individual experience based on variety of factors, such as preferences, previous app activity and social media sentiment. This new service also supports engagement and data tracking for both anonymous and authenticated users.
For example, if a user starts to use an app anonymously and later decides to login with social media credentials, developers can merge and continue to use data they previously stored around the anonymous account.
IBM deploys an immune system-like approach to security with data analytics and Watson for CyberSecurity. This helps companies to discover, manage and remediate threats across the entire enterprise.