Features

Identity and Access Management

Should You Give Biometrics a Break? Should You Give Biometrics a Break?

Biometric identification has been around for more than 100 years. Davey Winder investigates its relevance and feasibility for the IT security world today
07 September 2012

Token Debate: Worthless, Worthless Token Debate: Worthless, Worthless

This sums up the opinion of ISACA’s Richard Hollis when it comes to the value of token-based authentication
30 August 2012

Token Debate: Battle Tested, Industry Approved Token Debate: Battle Tested, Industry Approved

Their ability to remain nimble is why RSA’s Dan Schiappa believes tokens are the past, present, and future of two-factor authentication
30 August 2012

Looking Good on Paper Looking Good on Paper

Take note when warned of digital data loss, says Danny Bradbury – but don’t forget to secure your paper-based documents. It may be harder than you think
21 August 2012

Interview: Royal Holloway's Fred Piper Interview: Royal Holloway's Fred Piper

Often referred to as ‘the grandfather of information security’, this Professor needs no introduction. Here’s what happened when Eleanor Dallaway met Fred Piper…
17 August 2012

Comment: Cloud Security is not a Myth Comment: Cloud Security is not a Myth

Security is frequently cited as the primary reason why organizations are reluctant to adopt public cloud offerings. But is the public cloud inherently insecure? With the correct approach to security architecture, FireHost’s Chris Hinkley argues that securing the public cloud is possible
14 August 2012

Comment: Passwords Are the Achilles’ Heel of Cloud Security Comment: Passwords Are the Achilles’ Heel of Cloud Security

To address single sign-on (SSO) at cloud scale, Ping Identity’s Patrick Harding says IT administrators, security architects and developers must focus their energy on solving the problem with secure standards such as SAML, rather than implementing Band-Aid solutions like password vaulting
12 July 2012

Comment: Too Much Security May Affect Business Processes Comment: Too Much Security May Affect Business Processes

A balance is needed between the protection of information and productivity within a business environment, says David Cowan of Plan-Net
27 June 2012

Comment: Building a Risk-aware, Cyber-secure Culture Comment: Building a Risk-aware, Cyber-secure Culture

Using technology solutions to complement your security awareness programs is simply not enough, says IBM’s Chris Nott. You must go further and explain the risks to your employees, and why the technical controls were put in place
14 June 2012

Interview: ISF's Michael de Crespigny Interview: ISF's Michael de Crespigny

From chartered accountant to CEO of the ISF, Michael de Crespigny has spent his career assessing risk. Here, he tells Eleanor Dallaway why his career has been left to chance, why the information security industry is going through its adolescence and how Howard Schmidt’s were big shoes to fill
06 June 2012

Showing 71 - 80 of 169 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×