Great information but forgot a key security component. User Authentication. On Wed 26th of October I attended the Information Systems Security Association (ISSA) Security Symposium in Long Beach, California. Different security leaders discussed poignant topics like...
I have been following a very disturbing trend for a couple of months now, and it is that of Medical Identity Theft. When we think of identity theft, we typically worry about credit cards or store credit being taken out in our name. Somebody attempting to purchase a...
Microsoft®’s Forefront Needs More Than Identity Management for Cyber Attack Prevention Microsoft ‘s Forefront Identity Manager (FIM) 2010 provides IT with the tools needed for identity and access management through a SharePoint-based policy management console....
To businesses of all sizes the cloud is the rage. Companies are moving to the cloud for cost savings, convenience for their road warriors, data backup, new applications and a host of other business reasons. What one rarely hears is that companies are moving to the...
I have written many articles and blogs warning about the cost to a company from a security breach. Ben Worthen, a staff reporter in The Wall Street Journal’s San Francisco bureau, wrote a great article “What to Do if You’ve Been Hacked” on September 26, 2011, where he...
Paraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline: Employees Are Not Evil – They Are Just Drawn That Way. It is...