Archive For October, 2014
Identity management improves security at a lower cost. My numerous years of information security leadership experience at large organizations have helped me become a well rounded IT security professional. Therefore,…read more →
Dropbox security spoof exposes enterprise vulnerabilities. If you don’t know me, you may think I spend all my time writing about security breaches. Believe me I really would like to…read more →
- October 16, 2014 //
- Nelson Cicchitto
Password security blueprint. It amazes me that, despite all the money being spent on security measures, from endpoints to data leak prevention to database security, the single largest vulnerability continues…read more →
Password security blueprint. It amazes me that, despite all the money being spent on security measures, from endpoints to data leak prevention to database security, the single largest vulnerability continues…read more →
Gartner Symposium Booth 547. As the 2014 Gartner Symposium ITxpo draws to a close, I must admit it was one of the most stimulating, thought provoking symposiums I’ve seen. As…read more →
Identity and access management manual processes. With all of the publicity around data breaches and information security issues affecting organizations today, I am still amazed to find companies who are…read more →