Tag Archives: AIX
Our managed SSO service, SSO stat!, includes much more than just SSO implementation and fixing any problems directly related to SSO as soon as they occur. It also covers consulting for any question or issue related to authentication. as well … Continue reading
In a previous post on this topic, I discussed how to calculate the cost of a security-related project and how to compare different solutions for a given security-related project or issue. I asserted that there are three different aspects that … Continue reading
On October 7th IBM Systems Magazine hosted my webcast, How to Achieve SSO in a Day: Eliminate passwords and be an IT hero. I was very happy to see the large number of people who registered, attended, and stayed online until … Continue reading
A hot debate over the inherent security benefits of open source software — or lack thereof — has been raging (again) since the “heartbleed” bug came to light last spring. So…..from a security expert’s point of view (yes, mine!), is … Continue reading
Recently I’ve written several blog posts about biometric authentication in IT Shops (see “Target Attack Leads to Discussion of Biometric Authentication“, “IT Shop Requirements for Exploiting Biometrics“, “Biometrics and SSO“). This post discusses a couple of secondary factors.
In a recent post I noted that the Target breach once again raised the idea of biometric authentication as means of improving the protection of corporate data. Yet for all of its benefits, adoption of biometric authentication within the IT … Continue reading
“Former Hostgator employee arrested, charged with rooting 2,700 servers” was the headline of an April 19, 2013 article published by Ars Technica website. Rooting refers to providing the attacker a way to gain superuser access on a computer system. Doing … Continue reading