Perfect authentication remains elusive

Perfect authentication remains elusive

For years, leaders of the security industry have warned that passwords have outlived their usefulness. Users pick easy-to-crack passwords like...

March 3rd, 2010 Bill Brenner

Usability critical for good mobile security

Usability critical for good mobile security

The consequences of a data breach can be far-reaching and complex, but in almost every case the cause is simple....

April 21st, 2008 Richard Bray

Staff resignations put security ops in triage

Staff resignations put security ops in triage

Two members of my security team gave their two-weeks' notice this week. Each departed for different reasons. Our most technical...

June 30th, 2002 Mathias Thurman

Standards work should reinforce VPNs

Standards work should reinforce VPNs

The adage that time stands still for no man could hold true for VPNs, where a host of proposed standards...

November 4th, 2001 Tim Greene

Standing guard at the cyber-door

Standing guard at the cyber-door

As everyone knows, the days when corporate security meant locking your office door are long gone. As more technology is...

May 31st, 2001 Chris Conrath

Novell Modular Authentication Service (NMAS) 1.0.2 Enterprise Edition

Novell Modular Authentication Service (NMAS) 1.0.2 Enterprise Edition

InfoWorld (US)Securing your enterprise is always challenging, but today it seems like a hopeless task. Some days you don't even...

August 13th, 2000 P.J. Connolly