In a previous entry I described conceptually why it has become necessary to view networked computing through the identity paradigm rather than the more common location based security paradigms. In ...
Frankfurt, GERMANY, January 28, 2011 Today, on Data Privacy Day, a major research initiative was announced to pilot cryptographic technologies that enable citizens to ...
Eric is CEO of Strata Identity, an enterprise cloud identity expert, multi-exit serial entrepreneur and coauthor of the SAML SSO standard. One of the more challenging responsibilities for technology ...
Identity-based attacks aren't just limited to breached credentials of people with rights to sensitive information or privileged access to critical systems. Machine identities are increasingly being ...
Using SSH and encrypting your data are the biggest steps organizations can take to ensure that all their private information remains safe and secure and away from prying eyes. However, there are ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results