Blogmaster Note: This was originally posted on September 20, 2011 to the ComputerWorld UK Security Blog. The role of authentication as part of the CISO’s armory has been subject to some serious debate in recent months. In the wake of the RSA data breach, and the subsequent news of customers’ compromised data, the ability of hard tokens to defend against
A few weeks ago, I attended an InfoSec conference in Brussels, Belgium - "Enterprise Security Exchange". Overall, it was a great conference, as I was able to have great discussions with CISO’s of many known and respected global organizations.