Quantcast
Channel: Security Management
Browsing all 9 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Bring Your Own Identity: the Rise of the User

Social media is fast becoming the identity mechanism of choice to log into popular sites and company information. Looking to find the right music on Spotify? Want to connect with the world’s...

View Article



Image may be NSFW.
Clik here to view.

Surprise: Study Finds Security Not a Problem for Cloud

Companies experienced in cloud computing say it is proving to be even more successful than originally anticipated. That is, according to a newly published report, TechInsights Report: Cloud Succeeds....

View Article

Image may be NSFW.
Clik here to view.

Business Imperatives and the Identity-centric Perimeter

In a previous blog, I wrote about the notion of identity being the new perimeter, as the boundaries between IT and the rest of the business become more diffuse and blurry. I offered some thoughts...

View Article

Image may be NSFW.
Clik here to view.

Delivering Secure New Business Services: What Does it Really Mean?

This is the third in a series of blogs relating to the theme of “Identity-centric Security”. In my first blog, I highlighted some of the trends (cloud, mobile, social, information flow) that have...

View Article

Image may be NSFW.
Clik here to view.

Snowden Actions Shine Light on Insider Threat

Last week's thorough coverage of the NSA activity, PRISM and Snowden's leak of information shines a light on a part of security that all too often may get overlooked - that of protecting against the...

View Article


Image may be NSFW.
Clik here to view.

Securing access in today’s cloud and mobile world

This is the fourth in a series of blog posts about "Identity-centric Security." In my first blog, I highlighted the trends (cloud, mobile, social, information flow) that have led to the virtual...

View Article

Image may be NSFW.
Clik here to view.

Threats, attacks, and other bad things....Oh My!

This is the fifth in a series of blog posts about “Identity-centric Security”. In my first blog post, I highlighted the trends (cloud, mobile, social, information flow) that have led to the virtual...

View Article

Image may be NSFW.
Clik here to view.

Authenticate That Baby

The arrival of a new heir in the U.K., coincidentally with Lorde’s Royals zooming up the charts, naturally leads one to think about identity and authentication. Well, I do anyway. During the day or so...

View Article


Image may be NSFW.
Clik here to view.

Twitter Multi-factor Auth, Take-Two

Twitter has done a take-two on its multi-factor authentication attempt, proving again this is a challenging problem and one that cannot be ignored. Let's back up to the beginning.  In the wake of the...

View Article

Browsing all 9 articles
Browse latest View live




Latest Images