Reminders

Security

Photo of Sally HudsonOffline

Will FIDO Find Friends?

By Sally Hudson

The newly created FIDO (Fast IDentity Online) Alliance is promoting a standardized, global protocol and the necessary interfaces to allow organizations to support authentication solutions appropriate to the level of risk involved. The FIDO protocol will allow the interaction of technologies within a single infrastructure so security options can be tailored to the distinct needs of each user and organization. Users will be able to choose their own authentication form factor and not be reliant on passwords.


Photo of Naveen HegdeOffline

Security threats are evolving rapidly and the solutions that organizations implement to thwart such threats, play a major role in the success or failure of the organization's overall security strategy. The loss of data, threats to national security and protection for the same are receiving significant attention in Asia-Pacific (excluding Japan) (APEJ) countries.


Photo of Michael VersaceOffline

I've been going back and forth with my colleague Charles Kology on the issue of gTLDs and a recent proposal bankers to secure .bank and .insurance for exclusive industry use. This industry move is in part a response to ICANN's interest in expanding the number of TLDs in place today, and the interest in a higher degree of risk management and security for certain domains, particularly for internet properties used by the financial services community. Charles has provided some great perspectives on this, and I'd like to get your thoughts, too. Here's a quick backgrounder ------


Photo of Sally HudsonOffline

Let's Talk about the Privileged

By Sally Hudson

With all the political talk lately focusing on the privileged, I thought perhaps those of us involved with information technology should take a closer look at privileged status as well. In the IT world, these are traditionally systems admins, users with root privileges, business executives, etc. You know the definition, yet do you know how many privileged users are currently and accurately provisioned within your IT domain? If you don't, (and you're not alone), now is the time to get a handle on the situation.


Photo of Dinesh SrirangpatnaOffline

HP Intelligent Security Solutions: Breaks down Security Silo

By Dinesh Srirangpatna

Photo of Sally HudsonOffline

The IAM market is in a state of disruption as identity, protection, and trust are all intertwined at the core of any successful cloud strategy. Technologies in the SSO and strong authentication space are being evaluated in a new light as employees increasingly expect to be able to work anywhere on the device of their choice, managing/securing the corporate footprint of data on the device becomes essential. Given the popularity of the iPad, IDC expects to see more identity/security solutions offered towards the enterprise iPad user in the next 12 months.


Photo of Charles KolodgyOffline

Poker Explains Situational Awareness

By Charles Kolodgy

One of the more common analogies associated with cyber-security, is the chess analogy. The matching of chess and hacking/cybersecurity was prevalent in 2003's The Hacker's Handbook: the Strategy Behind Breaking Into and Defending Networks by Susan Young and Dave Aitel.


Photo of Naveen HegdeOffline

IBM's Center for Applied Insights conducted its first study of senior security executives, and interviewed more than 130 security leaders globally. The study’s core concentration was on the role of CISOs and many interesting findings were laid out.


Photo of John GradyOffline

The Best Deals….

By John Grady

…are often the ones not made, or so the saying goes. It’s easy to look back and evaluate acquisitions that were completed, whether it be soon after or long after the fact, and evaluate the success. But overlooked sometimes, are the deals that do not close for one reason or another, or never even get off the ground.


Photo of Naveen HegdeOffline

F5 Networks has been ramping up its strategy in the security market over the last few months. It has also launched several new products and added new security features to its existing products. Traditionally more focused on application delivery, F5 recognized the opportunity in the security market to provide solutions that would bridge the gap between the application and security.



Viewed 527,980 times