Internet Voting…What Could Possibly Go Wrong?

Cybersecurity experts are known for their tough and varied opinions: Put six different experts in a room and you’ll wind up with 10 different opinions, the old saw goes. With the US 2016 election cycle in full swing, internet voting is once again back in the news, this time in Utah as the state’s Republican…

Why Marketing, HR and Finance Should Have a Bigger Say in Your IDaaS Strategy than You May Think

My colleague Darren Platt recently weighed in on the undeniable upward trend of organizations moving toward Identity as a Service, or IDaaS. While only 15% of organizations report having a cloud-based pure play for their identity solutions, more than 55% are saying they have a mix of cloud and traditional. Cloud-hosted identity solutions appear to…

How to Tame the Digital Pitchfork Mob and Harmonize Your Identity Management

There’s nothing like a little login frustration to turn users against their IT gatekeepers, storming the help desk with their digital pitchforks and torches. People expect simplicity, ease-of-use and flexibility when accessing workplace resources. Whether they bring in their own devices, use personal apps for company work, or look for unfussy access to corporate resources while…

Hybrid Access Solutions Are the Cat’s Pajamas

As companies journey to the cloud, enterprise security teams find IT environments increasingly difficult to secure. It’s not hard to see why. Company resources and data are moving to cloud-based applications, scattered outside of the firewall.  Employees, contractors and partners are all demanding access – from their mobile phone while they wait for their coffee…

RSA SecurID Customers Take Note: RSA Via Access is for You, Too!

Today, RSA announced a milestone – the upcoming 2015 release of RSA Via that includes RSA Via Access  – a new hosted cloud-based authentication service for single sign-on to SaaS and on-premise web applications. This news not only is exciting, it’s game-changing. And it demonstrates that RSA is meeting customer needs for a unified approach to…

The World is a Global Fraud Stage, Mobile e-Commerce is the Next Big Act

Sir Isaac Newton discovered in his Law of Conservation of Energy that energy cannot be destroyed, merely transformed from one form to another. The parallels to fraud in the online world run along similar conventions.  When a particularly effective means of shutting down fraud start to gain traction (through new technology, new regulations go that…

Ransomware for Real: An IT Horror Story Coming to Your Organization

I was speaking on a panel at IT Nation 2013 in Orlando this past week about the changing threat landscape for managed service providers, and an interesting and unexpected topic seemed to dominate the audience-panel Q&A. I’ll tell you the topic but first I’ll need 10,000 Bit coins wired to me. Just kidding. As you…

Smartphones & Biometrics: The Big Picture

The big news last week on the smart phone security front was the announcement of Apple’s iPhone 5s with built in fingerprint scanning technology called Touch ID. Early reports say the biometric component will have somewhat limited use – mostly to replace the PIN used to unlock the device, or to confirm a purchase on…