Cryptographers spank blockchain, social media
RSA Conference panel takes hard look at current issues. The group also questions the industry's obsession with increasing speeds at the expense of security.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
RSA Conference panel takes hard look at current issues. The group also questions the industry's obsession with increasing speeds at the expense of security.
Pro-active efforts set breach protection as a corporate priority
Can oversight and stiff punishments spur enterprises to prioritize cybersecurity and secure their data?
Swirlds collecting accolades, improving platform
Smell of Data project attempting to add your senses back into the protection equation
Those that issue user credentials, and those that accept them, now have access to OpenID Connect certification
Goal is to offer community, services, information sharing, certifications to those building identity systems
Agency's report cites compromised-password threat but mitigation advice barely acknowledges best defense against most common, costly attack
Google's first wave of security changes to convert webmasters to encrypted HTTPS target pages that ask for login data or credit card information.
Awareness, standards, innovation key pieces of formula that could deliver better identity, access management
Ruling contradicts earlier cases, could have broader implications for digital age, recognized data-protection methods
FBI, Apple set tone for year that saw progress in on-going attempt to devise better access controls
Security, privacy, governance, analytics all part of story for next wave of identity and access management
The novelty of connected devices spawns a Frankenstein of network killers and a list of questions
Aging, outdated systems make techniques such as ransomware common and hard to defend