How the Passwords Will Work in Future?
Researchers regularly come up with revolutionary ideas to replace the clunky, fiddly and mostly rather insecure passwords we use for almost all of our authentication needs. The latest schemes to…
Researchers regularly come up with revolutionary ideas to replace the clunky, fiddly and mostly rather insecure passwords we use for almost all of our authentication needs. The latest schemes to…
Today, one of the most common discussions I have is “How do I qualify the cyber security risk to my board?” The security industry is very good at being able…
Why isn’t being a CIO fair? Because you have to pay attention to both IT and the business, and the business only has to pay attention to the business. It’s…
Welcome to VMworld 2013 and Imagine Dragons. Love that “Radioactive” song! Oops, sorry, wrong blog. 😉 Seriously, I want to share with you some powerful developments in the evolution of…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More