An Entitlement-Centric Approach to Security
Last week, I gave a well-received talk to a group of CxO and high-level IT managers on a new way to think about security built around entitlements. The premise of the talk was that with the...
View ArticleSo What Does Constitute “Reasonable” Security?
A couple of weeks ago, I tweeted about what I called a must-read article by Brian Krebs. Fellow identirati Anil John lamented yesterday that we hadn’t discussed this more in the community, and on...
View ArticleFFIEC Updates Their Guidance. And The Winner Is…
In my last post, I mentioned that the FFIEC was preparing an update to their 2005 guidance on internet banking authentication. Well, that update is out, and Anil John couldn’t wait to let me know about...
View ArticleBuilding the Self Defending Enterprise
Algorithms. Algorithms. Algorithms. If Steve Ballmer were still running the show at Microsoft, I’m pretty sure that would have been his chant at the next conference. The abundance of data being...
View Article