How to steal a billion IDs and Passwords and how to prevent it – Trust Architecture
I’m not sure the exact numbers, but browser providers these days are providing the very useful, ability to share your […]
I’m not sure the exact numbers, but browser providers these days are providing the very useful, ability to share your […]
Perhaps because more higher impact incidents are making the media these days. Perhaps there is an actual increase in threat
We are all imperfect messengers. And while I appreciate that many of our more sensible (from my perspective) messages are
People who don’t have to do it seem to not understand the nature of the cyber threat. This very short
Of course until you are successfully attacked, doing nothing about security is a great approach. It saves money and time
I very often see false choices about paths forward. One of the most common ones is the question about the
Many years ago, Gartner declared “Firewalls are Dead”, but some 20 years later (give or take) they are still reporting
How is an application program interface different from an other application interface? At a basic level, they are the same
Good luck finding someone qualified… The SEC is apparently about to make it a requirement for public companies to report
Every once in a while I come across something interesting with substantial potential impacts but that differs from the common
People seem to me to be having problems dealing with enjoying their lives lived increasingly online. I live a life
The Capability Maturity Model notions that, starting from scratch, a program matures by going through phases. None: What is being