Quantcast
Channel: Let's Talk Security » user identities
Browsing all 30 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Data breaches – the new daily reality

By Ben Rothke, Senior Security Consultant, BT Global Services Two stories from July about data breaches should give everyone pause. The WikiLeaks’ Afghan War Diary shows the staggering effect of a...

View Article



Image may be NSFW.
Clik here to view.

Amazon, Starbucks and Information Security Data – Part #1

By Ben Rothke, Senior Security Consultant, BT Global Services, CISSP CISA What do Amazon and Starbucks have to do with information security data?  They seem to be the mechanism being used to obtain...

View Article

Let’s Practice What We Preach – Stay Safe Online

By Tara Savage, Global Security Marketing Manager, BT As security professionals, we think about data privacy and network security issues more than the average person.  But do we take our own advice to...

View Article

WikiLeaks: What Caused the Largest Leak in History?

If publishing several thousand U.S. Department of State (the State Department) communication cables on the Internet is not the largest public leak in the history of the U.S. government, it is certainly...

View Article

Security of the Cloud: Challenges and Landscape

The cloud landscape continues to evolve quickly, and, as a true ecosystem, has seen the introduction of several new technologies, delivery models and players into the market. It is characterized by...

View Article


Pass Me a Towel, the Frog Wants to Get Out…

By now we are all more than aware of the stream of attacks, exploits, disclosures and denial of service attacks, to name but a few.  Some of these make it into the mainstream media, others have...

View Article

The 12 Days of Christmas for Security Geeks

Twas the night before Christmas, and all through the house, not a peripheral was stirring, not even a (bluetooth) mouse… So, it is that time of year again where everyone is filled with holiday spirit...

View Article

California Expands Its Data Breach Notification Law

On January 1, 2012, California’s expanded version of its Identity Theft Law came into full effect.  SB 24, which had been signed into law by Governor Jerry Brown in 2011 established specific content...

View Article


The PCI Council’s ASV Program Gets a Makeover

In order to be PCI compliant It is required that customers scan their networks quarterly and for their external presence to be scanned by an Authorized Scanning Vendor program (ASV). In 2011 the PCI...

View Article


Guest Post: Three Malware Trends to Watch in 2012

2011 was a landmark year to say the least, in terms of network security and the overall evolution of malware, and there are no indications that things will slow down anytime soon. In fact, we expect to...

View Article

How We Manage/Don’t Manage Security is of Great Importance

By Sam Erdheim, Algosec The title of this blog entry may seem obvious, but it hasn’t traditionally elicited the headlines that the latest data breach or attack vector regularly receive. Poor visibility...

View Article

Image may be NSFW.
Clik here to view.

Password perils

By Peter Gunning, Business Development, Identity Services, BT In an industry which loves its eponymous laws (e.g. Moore’s, Wirth’s) and principles (e.g. Kerckhoffs’s and…er…Dilbert’s) someone surely...

View Article

Image may be NSFW.
Clik here to view.

A new identity in financial markets

Banks, brokers and market regulators around the world have always faced the challenge of identifying individual counterparties and customers. Within financial institutions, because of the siloed...

View Article


Image may be NSFW.
Clik here to view.

Biohazard: Will biometric authentication ever go mainstream? – Part 1

In the first of a two part blog Peter Gunning – Identity Management Consultant, BT – discusses the use of biometric authentication and if it’s likely to catch on and replace the use of passwords and...

View Article

Image may be NSFW.
Clik here to view.

Biohazard: Will biometric authentication ever go mainstream? – Part 2

In the second part of  his blog looking at biometrics, Peter Gunning – Identity Management Consultant, BT – discusses the use of biometric authentication the benefits it could have in the real world....

View Article


Image may be NSFW.
Clik here to view.

Data breaches – the new daily reality

By Ben Rothke, Senior Security Consultant, BT Global Services Two stories from July about data breaches should give everyone pause. The WikiLeaks’ Afghan War Diary shows the staggering effect of a...

View Article

Image may be NSFW.
Clik here to view.

Amazon, Starbucks and Information Security Data – Part #1

By Ben Rothke, Senior Security Consultant, BT Global Services, CISSP CISA What do Amazon and Starbucks have to do with information security data?  They seem to be the mechanism being used to obtain...

View Article


Let’s Practice What We Preach – Stay Safe Online

By Tara Savage, Global Security Marketing Manager, BT As security professionals, we think about data privacy and network security issues more than the average person.  But do we take our own advice to...

View Article

WikiLeaks: What Caused the Largest Leak in History?

If publishing several thousand U.S. Department of State (the State Department) communication cables on the Internet is not the largest public leak in the history of the U.S. government, it is certainly...

View Article

Security of the Cloud: Challenges and Landscape

The cloud landscape continues to evolve quickly, and, as a true ecosystem, has seen the introduction of several new technologies, delivery models and players into the market. It is characterized by...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images