The New Security Awareness

I remember when I was pregnant with my first child and starting to research the baby products I would need to have on hand.  The port-a-crib, the stroller, the high chair, and any number of items that probably got a few weeks use.  Consumer Reports was definitely my friend, as I looked for the best…

The Security Re-Eruption Cycle

    It’s not uncommon to hear about the great technology disruptor that, after initial success, becomes larger and slower and ultimately becomes disrupted itself (see: Palm Pilot, Atari).  Naturally, the same phenomenon exists in security.  However, there’s a parallel phenomenon that occasionally crops up, in which we’re not dealing with Disruption, but with Re-Eruption.…

California Breachin’

When I first started doing security consulting at the turn of the century, there was a sense among my colleagues (probably apocryphal) that encryption was one of the few things that our least savvy customers knew how to do.  As in: “What are you doing to protect your organization and data?”  “Well, we use encryption”. …

Damned If You Do, Damned If You Don’t

By Sandra Carielli, Senior Product Manager, Access and Data Protection If the user passwords in your organization are compromised, do you: a.)    Notify your users and ask them to change their passwords b.)    Pro-actively reset all passwords immediately As an end user, if your password is compromised, would you rather: a.)    Be asked to reset…