The good news about network security is there are always new processes, products and updates to fight the constant battle against malicious nogoodniks. The bad news? Those malevolent rascals tend to always pull more aces out of their sleeves.
One of the emerging Internet-of-Things consortia has struck pay dirt, having completed initial development work on a protocol for enabling software platforms for everyday devices.
This week, one of my favorite online analysts shares the experience of his new bank doubting his authenticity as a genuine person.
In his commentary this morning, my very good friend and colleague David Strom lists several of the ironies emerging from the Sony Pictures incursion story.
If you give a group of C-suite executives a list of bad things to choose from and tell them to arrange them in order of bad-to-worse, like a tally of "Brady Bunch" episodes, does the one...
A security upgrade process just begun by ICANN on its zone domain transfer system revealed a compromise whose signature implies the hacker knew what he or she was doing.
If you're scared by the idea of a central server out there in the world granting you access to your company network, maybe you'd feel easier with your company network granting you access to the world.
The era of logging onto the Web using a real, physical key may have just begun. Of course, if things start to get cumbersome and that key is easily bypassed, it may have just ended.
One of the objectives that the FIDO Alliance 1.0 Specification sets forth is to strengthen authentication through a choice of multiple factors. And one of its compromises is allowing passwords to be one factor.
It remains the conversation we're afraid to have: the one that leads us to the conclusion that the only way to secure our communications is with a system that reliably identifies us.