Posts Tagged ‘strong authentication’

TechEd 2012 – Were you there?

0

Posted on 3rd Aug 2012 by in Enterprise

Microsoft may not be renowned for throwing wild parties, but when you gather over 7,500 people in Amsterdam for a week, you’re bound to come back with some stories. I had the pleasure of attending Microsoft’s TechEd conference last month, an event dedicated to conferences, workshops and hands-on sessions with IT professionals and developers. Nestled […]

Who’s really in charge when it comes to security?

2

Posted on 29th Jul 2012 by in Enterprise

In the latest of our series of blog posts looking at the results of our recent CIO research, we take a look at the thorny subject of who is ultimately responsible for information security within an organization. Prevailing trends in technology would suggest that maintaining control of IT security is becoming an ever more difficult […]

To BYOD or not to BYOD – A CIO headache

0

Posted on 11th Jul 2012 by in Enterprise

The next in our series of blog posts looking at the security issues affecting CIOs in the modern era focuses on the rise of personal internet devices being used at work. In fact, there’s a good chance you’re reading this post on a personal device, perhaps on an enterprise internet connection? It’s something we’re all […]

How much control do CIOs have over confidential information shared by their executives? – Question from Ardaman Kohli

0

Posted on 28th Jun 2012 by in Enterprise

Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the results of our research into the attitudes of CIOs. Next on our agenda is the above question from Ardaman Kohli. It’s true that it doesn’t matter how secure CIOs themselves […]

Who is principally responsible for managing IT security in companies? – Question from Martin McKeay at Network Security Blog

0

Posted on 18th Jun 2012 by in Enterprise

Those with long memories may recall our call-out a few months ago asking for readers’ questions on global CIO’s attitudes towards security. We wanted to find out the burning security issues which are affecting CIOs today and we received a lot of interesting responses from readers and influencers who had their own questions that they […]

LinkedIn hack sheds light on inherent weakness of passwords

0

Posted on 8th Jun 2012 by in Enterprise

Earlier this week, amidst reports that more than 6.5 million passwords may have been compromised in a hack of a LinkedIn database, I received several calls and emails from friends and family that feared the worst of their LinkedIn accounts, especially after LinkedIn’s Vicente Silveira took to the company’s blog to confirm the reports. Silveira […]

LinkedIn security breach: What’s your password?

0

Posted on 7th Jun 2012 by in Enterprise

Another major breach was announced in our social media world today. This time LinkedIn was the target and more than six million users are the potential victims. A Russian hacker claims the theft of 6,458,020 encrypted LinkedIn passwords and to prove it, posted the passwords on his website (thankfully without usernames). In addition, he asked […]

Forget privacy? Big Brother is watching you

0

Posted on 1st Jun 2012 by in Enterprise

Now I don’t want to be accused of fear mongering, but I recently came across a website that has an alarming amount of my personal data on file without me knowing. In fact, if you live in the US, it probably has most of yours too. I’m not averse to sharing my name; gender and […]

Apple Mac users beware – charting the unknown waters of malware

0

Posted on 18th May 2012 by in Enterprise

As a PC user who converted for a short time to Mac and came back to PC, I’m used to hearing the comments from Apple enthusiasts about the superior security and lack of virus threats on the Mac OS system.  I took some heat for my decision to return to a PC from my Mac […]

Just another word or two – passphrases vs passwords

0

Posted on 11th Apr 2012 by in Enterprise

We have blogged many miles of space about the dangers of protecting your business assets with a simple username and password solution. Now there is a new trend using passphrases as a beefed up type of authentication. The problem is, there’s not much meat to this solution. Passphrases are basically a group of dictionary words […]