Bring Your Own Identity: the Rise of the User
Social media is fast becoming the identity mechanism of choice to log into popular sites and company information. Looking to find the right music on Spotify? Want to connect with the world’s...
View ArticleSurprise: Study Finds Security Not a Problem for Cloud
Companies experienced in cloud computing say it is proving to be even more successful than originally anticipated. That is, according to a newly published report, TechInsights Report: Cloud Succeeds....
View ArticleBusiness Imperatives and the Identity-centric Perimeter
In a previous blog, I wrote about the notion of identity being the new perimeter, as the boundaries between IT and the rest of the business become more diffuse and blurry. I offered some thoughts...
View ArticleDelivering Secure New Business Services: What Does it Really Mean?
This is the third in a series of blogs relating to the theme of “Identity-centric Security”. In my first blog, I highlighted some of the trends (cloud, mobile, social, information flow) that have...
View ArticleSnowden Actions Shine Light on Insider Threat
Last week's thorough coverage of the NSA activity, PRISM and Snowden's leak of information shines a light on a part of security that all too often may get overlooked - that of protecting against the...
View ArticleSecuring access in today’s cloud and mobile world
This is the fourth in a series of blog posts about "Identity-centric Security." In my first blog, I highlighted the trends (cloud, mobile, social, information flow) that have led to the virtual...
View ArticleThreats, attacks, and other bad things....Oh My!
This is the fifth in a series of blog posts about “Identity-centric Security”. In my first blog post, I highlighted the trends (cloud, mobile, social, information flow) that have led to the virtual...
View ArticleAuthenticate That Baby
The arrival of a new heir in the U.K., coincidentally with Lorde’s Royals zooming up the charts, naturally leads one to think about identity and authentication. Well, I do anyway. During the day or so...
View ArticleTwitter Multi-factor Auth, Take-Two
Twitter has done a take-two on its multi-factor authentication attempt, proving again this is a challenging problem and one that cannot be ignored. Let's back up to the beginning. In the wake of the...
View Article
More Pages to Explore .....