Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Here’s a dull-sounding question: Imagine a world without SSL (secure sockets layer) or its successor TLS (transport layer security)? A security tech-head may find the whole thing quite interesting, but for the average IT user, despite relying on SSL day-in, day-out, it will not arouse much exc ...
Posted 03 March 2014 by Bob Tarzey
0
comments
Extending Microsoft Active Directory
Microsoft Active Directory is a database embedded in all Windows server operating systems and in Windows Azure (Microsoft’s cloud-based platform-as-a-service/PaaS offering). The directory is used to store information about objects and their attributes that are active within a given Windows net ...
Posted 06 January 2014 by Bob Tarzey
0
comments
By Merritt Maxim We continue to hear about how cloud, mobility and the consumerization of IT has the potential to transform business. However, the ongoing hype around these trends may lead some to believe that these trends require an “all or none” approach. This can create conflicts a ...
Posted 10 June 2013 by Cloud Security Alliance (CSA)
0
comments
By Ed King As cloud and mobile computing make enterprise IT ever more extended, the traditional security model of keeping the bad guys out and allowing only the good guys in no longer works well. While the reach of the enterprise has expanded, the security perimeter may actually have to shrink to ...
Posted 20 March 2013 by Cloud Security Alliance (CSA)
0
comments
1.5 Factor Authentication: Myth or Fact?
 Last week, I met with Steven Hope, technical director at Winfrasoft, a multi-factor authentication company. As Hope was introducing me to the company and their suite of products, he listed everything they offer: “PINgrid, PINphrase and PINpass which deliver strong and affordable two-fac ...
Posted 20 December 2012 by Eleanor Dallaway
0
comments
Debunking the Gospel of Security Marketing
Identity and access management are critical for most, if not all organizations – whether its employee access to enterprise networks, or customers who need access to your products and services. Authentication – and the credentials that make it possible – is at the heart of many data ...
Posted 27 August 2012 by Drew Amorosi
0
comments
Not all systems administration (sys-admin) is done by people. Some applications need administrator access to communicate and make changes. Furthermore, remote management tasks are often carried out using pre-set procedures in sys-admin tools, for example the backup of branch office devices. For thi ...
Posted 15 February 2012 by Bob Tarzey
0
comments
By Paul Madsen Federation is a model of identity management that distributes the various individual components of an identity operation amongst different actors. The presumption being that the jobs can be distributed according to which actors are best suited or positioned to take them on. For insta ...
Posted 03 May 2011 by Cloud Security Alliance (CSA)
Showing 1 - 8 of 8 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×