The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.
Neither Canada's nor the U.S.' attempt to foster new wireless competition from the sale of AWS-3 frequencies ever amounted to much. What's the Canadian for, "Try, try again?"
POPULAR COMMENT THREADS
The new alliance means IBM will be selling iPads, and Apple will be making room for IBM enterprise services. Sensible enough. But partnerships require communication, and only one of these two is good with that.
How can the largest producer of collaboration appliances make collaboration work where appliances typically don't? Cisco engineers are tackling the problem before they're tackled by it.
The problem of securing identity in a network of both mobile devices and clouds is only growing more complex. A solution may require us to transcend what we think we know.
The most eye-opening survey numbers from Ponemon to date imply that no one--absolutely no one--is actually implementing security governance standards as specified.
Last Monday in Spotlight, I pointed you toward an article from the personal blog of security researcher Jonathan Zdziarski, who reported on the existence of several exploitable back doors around security features in Apple's iOS.
It looks like an open source, on-premise implementation of Dropbox. Look closer, though, and you'll see a way to securely open up object stores on an OpenStack platform.
From Our Sister Sites
At the heart of the problem is a recently patched security flaw in MailPoet, a plugin with over a million downloads.
"Young leaders think that … you just automatically come in, and become a team and it just doesn't work that way," says Tredgold, who has filled a series of leadership positions throughout his 25 years in IT.