How to Protect Against the Dangers of Public WiFi Abuse
Art Gross blogs on Breach Secure Now: “An article over at medium [by Maurits Martijn] gives excellent insight into the real dangers of open public WiFi. After reading this article you will never use a public WiFi… Continue reading
The Future of Security Architecture Certification
Would you drive over a Bay Bridge built from an amateur building architect’s blueprints? What if the architect passed a multiple choice test first – is that good enough? Society’s answer to these questions is obviously NO. But unlike… Continue reading
Is Security Architecture Failing?
“One of the discussions that never happen in relationship to the numerous successful hacks is: What was the security architecture? Security architecture – or any architecture for that matter – is the foundation upon which we should secure and protect… Continue reading
Token Bindings to Gear Up Authentication Assurance
In last year’s “Passwords are Overloaded, Not Dead” I voiced skepticism that security’s oldest construct would be replaced anytime soon. But many in the industry continue working to replace passwords, and while their marketing slogans may… Continue reading
CBS Launches CSI Cyber Series with Hacked Baby Cam Story
Cyber CSI’s “Kidnapping 2.0” episode highlights cybercrime, forensics, IoT vulnerabilities, darknets and password quality issues for the public. Police and other law enforcement investigators should watch for any realistic tips and techniques they can use. But politicians and prospective… Continue reading
Is Bimodal IT a Useful Concept for Security?
Facing the complexity of modern organizations and their increasing difficulty adapting to business, technology and social change, pundits coined the term “Bimodal IT”. In 2014, IT analysts such as Gartner’s have based much of their work on Bimodal IT as… Continue reading