0

The Equifax data breach: a case study on how NOT to handle a breach

By now we all have heard and read about the Equifax data breach, that has exposed the personal details and credit record of 143 Million Americans; that’s nearly 44% of the U.S. population. While [...]

1

Miss the “C” Word and be doomed

Secure SDLC in the PCI DSS Ver 3.2 Ambit: “Compliance Management ( the “C” Word) I recently attended a conference where a discussion started on how the PCI DSS Standard meshed [...]

0

WannaLaugh? Bolster your security program in under a dozen steps

Nothing provides better security than a fresh pair of eyes. In a military operation, it is rare to have the same sentry defend a specific military post forever. It’s the same with a cyber [...]

0

USAA and Persistent – Not Just Another Risk Based Authentication Service!

Today we announced a really exciting new partnership with USAA. You can read the press release here, and you can read a research note about it by Constellation Research here.  But I’d like to [...]

0

Security Considerations for the End-to-End IoT Platform

Securing things. Everything. Connected to the Internet. Simple enough, right? IoT security is a vast topic, with a lot of research going on, a lot of literature available, and a lot of different [...]

0

President Obama’s email got breached – are you sure your data is safe?

As if death and taxes weren’t bad enough, now we can add data breaches to life’s certainties. Following up on the Target breach of 2013, which affected 40 million credit card holders, 2014 [...]

0

Why Enterprises should consider Oracle IdM 11gR2: Part 2

My previous post on this topic explored how Oracle IdM 11gR2 brings innovation in the Enterprise IAM product space. This post describes how the platform approach of Oracle IdM 11gR2 can benefit [...]

0

Why Enterprises should consider Oracle IdM 11gR2: Part 1

Recently Oracle announced the release of Oracle Identity Management 11g Release 2 (Oracle IdM 11gR2), the most prestigious and awaited release of the Oracle Identity and Access Management (IAM) [...]

1

Practical Aspects of Securing Web Applications

In a day and age when all developed applications that conduct some level of e-commerce are Internet facing, writing secure web code should naturally become par for the course! And if you add to [...]