Quantcast
Browsing latest articles
Browse All 7 View Live

An Entitlement-Centric Approach to Security

Last week, I gave a well-received talk to a group of CxO and high-level IT managers on a new way to think about security built around entitlements. The premise of the talk was that with the...

View Article


Image may be NSFW.
Clik here to view.

So What Does Constitute “Reasonable” Security?

A couple of weeks ago, I tweeted about what I called a must-read article by Brian Krebs. Fellow identirati Anil John lamented yesterday that we hadn’t discussed this more in the community, and on...

View Article


Image may be NSFW.
Clik here to view.

FFIEC Updates Their Guidance. And The Winner Is…

In my last post, I mentioned that the FFIEC was preparing an update to their 2005 guidance on internet banking authentication. Well, that update is out, and Anil John couldn’t wait to let me know about...

View Article

Image may be NSFW.
Clik here to view.

Building the Self Defending Enterprise

Algorithms. Algorithms. Algorithms. If Steve Ballmer were still running the show at Microsoft, I’m pretty sure that would have been his chant at the next conference. The abundance of data being...

View Article
Browsing latest articles
Browse All 7 View Live