Archives for July 2012 « Recent Articles
The IAM market is in a state of disruption as identity, protection, and trust are all intertwined at the core of any successful cloud strategy. Technologies in the SSO and strong authentication space are being evaluated in a new light as employees increasingly expect to be able to work anywhere on the device of their choice, managing/securing the corporate footprint of data on the device becomes essential. Given the popularity of the iPad, IDC expects to see more identity/security solutions offered towards the enterprise iPad user in the next 12 months.
I recently spoke with the guys from OneLogin, a small, privately held software company based in San Francisco that provides Secure Single SignOn (SSO) technology. The company has been around for a couple of years and seems to be acquiring customers at a slow but steady pace --- not terribly easy to do in the SSO space, given the number of firmly entrenched enterprise incumbents. OneLogin's recent news focuses on the company's release of an iPad app to enable enterprise SSO. It is available…
One of the more common analogies associated with cyber-security, is the chess analogy. The matching of chess and hacking/cybersecurity was prevalent in 2003's The Hacker's Handbook: the Strategy Behind Breaking Into and Defending Networks by Susan Young and Dave Aitel.
The problems with the chess analogy are it is a one-on-one game, it has a set endpoint, and all of the pieces are visible. With Hold'em, you don't have any of that. There are multiple players who must be contended with, the game can go on forever, and most importantly it is all about imperfect information. You don't know what your opponent's hole cards are while you get to see your cards and the common cards.
The key to victory is making informed decisions by collecting and processing a…
IBM's Center for Applied Insights conducted its first study of senior security executives, and interviewed more than 130 security leaders globally. The study’s core concentration was on the role of CISOs and many interesting findings were laid out.
Over the past several years, security has gained a lot of importance. Organizations now pay more attention to security than they did a couple of years ago. To make an organization secure, several factors must be in place. They include efficient collaboration between the security department and management, budget, creation of security awareness within the organization, technology and many more. Among the other factors, the role of the Chief Information Security Officer (CISO) of an organization…
About this channel
- 528k views
- 33 articles
- 11 followers