Authentication After the RSA breach: Sticking to Hard Tokens Could be a Mistake
Blogmaster Note: This was originally posted on September 20, 2011 to the ComputerWorld UK Security Blog. The role of authentication as part of the CISO’s armory has been subject to some serious debate in recent months. In the wake of the RSA data breach, and the subsequent news of customers’ compromised data, the ability of [Read More...]
Letter to Compliance Week Editor Regarding Data Breach at Security Firm Could Make Others Vulnerable Article
Blogmaster Note: This is a letter to the editor of Compliance Week in reference to its article titled “Data Breach at Security Firm Could Make Others Vulnerable” written for the site by Karen Kroll on June 21. To the Editor: Earlier this month, I was interviewed by your reporter, Karen Kroll for the June 21 [Read More...]
A Platform Approach to Authentication. . . ‘cause you just can’t keep changing things out!
Last week I was pretty proud of myself when I came up with the term “Breach Speed” (See: “When things are moving just a little too quickly . . . the whirlwind of data breaches” ); and I know my colleagues have had to live with me being a little more insufferable than usual , [Read More...]