Trust @ Virtual EMCworld 2014

This year, for the first time, the content of EMCworld is being made available on-line — not just to EMCworld attendees, but to everyone. From keynotes to sessions to panoramic tours, Virtual EMC World 2014 makes a wealth of insights and information available, including about the themes of trust, security and privacy, just by clicking “Watch…

The World Cup of DDoS Attacks

Hacktivist for Operation Hacking Cup #OpHackingCup took down the Brazil World Cup site and have targeted hundreds of other sites.  This was not the first time a major event has been targeted nor will it be the last. Hacktivist have been actively leveraging Distribute Denial of Service (DDoS) attacks as a way to successfully highlight…

Barbarians Inside the Gates

In our many discussions around Trust we’ve tended to focus on what organizations have been typically most concerned about – the barbarians at the gate, a.k.a. external threats. Sophisticated government-sponsored hacker teams, regional disasters, and critical device failures are the bread and butter of our daily work lives, and they’re what we tend to focus…

Keeping Criminals at Bay to Prevent Targeted Attacks

Opportunistic attacks, whereby an attacker finds a weakness that can be exploited, still account for the majority of cyber attacks, at 75% of all attacks, according to Verizon in its 2013 Data Breach Investigations Report. However, their growth is waning, as their results are uncertain to be successful for the attacker. Rather, criminals are turning…

Overcoming Barriers to Identity-as-a-Service

Like many organizations, you may be considering a cloud-based identity service (also referred to as Identity-as-a-Service, or IDaaS). If you are unsure whether a cloud-based solution is right for you, we recommend that you take a look at our recent blog post on that subject. If you decide that IDaaS might be a good fit…

The Quest for the World Cup – Employers Why Can’t I Just Watch It?

I was sitting at an airport bar with other business travelers when the US scored within the first 32 seconds of the game against Ghana.  The excitement in the air showed me how much attention the World Cup games has really gained.  Aside from the adrenaline brought on by that goal, I was also finding…

Leadership Qualities for Today’s CISOs

This past week I attended the quarterly chapter meeting of the Information Security Forum.   As this was a combined meeting between the North American and Canadian chapters, the meeting was an excellent cross section of industry and geographic sectors.  The meeting was filled with great conversations on security topics challenging CISOs today. At one point…

Unlocking Identity Intelligence  

Identity Intelligence is a term you may have heard lately – and it represents the next level of IAM program maturity, for which many organizations are now aiming.  Robust identity intelligence can guide the right access decisions across the identity lifecycle, helping to minimize risk and enable compliance with internal guidelines and external regulations.  Doesn’t…

Unlocking Identity Intelligence

Identity Intelligence is a term you may have heard lately – and it represents the next level of IAM program maturity, for which many organizations are now aiming. Robust identity intelligence can guide the right access decisions across the identity lifecycle, helping to minimize risk and enable compliance with internal guidelines and external regulations. Doesn’t that sound…

The Creepy Factor of the ‘Internet of Things’

Beneficial technology sometimes has unintended consequences. Sometimes products or services that make life simpler or more convenient also puts us at greater risk. As more devices monitor and track our lives, they also gather copious amounts of personal and sensitive data that could be compromised or exposed. The potential attack surface is exponentially greater when…