Video Screencast Help

Search

Search results

Passwords must die. At least, that was a theme of the Gartner Identity and Access Management Conference I recently attended. And you don’t have to be a security expert to see that our traditional system of “think of something you can easily remember” ...
Blog Entry by Marty Jost | 10 Jan 2013 | 7 comments
With mobility and the cloud dominating today's computing landscape, IT needs to examine new methods of ensuring trustworthy access, including risk-based authentication methods that strike a balance between robust security and accessibility. ...
Blog Entry by Marty Jost | 10 Dec 2012 | 0 comments
Enterprise Cloud adoption continues to accelerate. It’s no longer a question whether the Cloud will gain acceptance but how quickly and broadly it will spread. The cost advantages that Software as a Service (SaaS) delivers make it widely attractive as ...
Blog Entry by Marty Jost | 03 Nov 2012 | 0 comments
A recent BBC article has shed further light on the fact that not all online security companies or products are created equal. According to the article, hackers have found a way around some banks’ two-factor authentication security devices and have gained ...
Blog Entry by Marty Jost | 05 Apr 2012 | 1 comment