Identity & Access December 27, 2017 In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach 3 min read - Fraudsters are after more than just passwords, and protecting user credentials is more crucial than ever amid the increasingly advanced threat landscape.
Risk Management April 11, 2017 Architectures for Securing IT Systems 5 min read - IT analysts can refer to the human immune system as a model for securing IT systems through careful vetting of data and prioritization of threats.
Data Protection December 15, 2015 My Employees Are in a Data Breach! What Now? 3 min read - As a CISO, what can you do when your employees are involved in a data breach? What should you know about their potential involvement beforehand?
Endpoint November 17, 2015 Digital Trust in an Analog World: Can Risk-Based Access Reduce the Barriers to Mobile Working? 3 min read - Risk-based access, which combines pre-existing knowledge of users and devices with the proper context, may be a viable security solution.