Video Screencast Help

Search

Search results

Passwords must die. At least, that was a theme of the Gartner Identity and Access Management Conference I recently attended. And you don’t have to be a security expert to see that our traditional system of “think of something you can easily remember” ...
Blog Entry by Marty Jost | 10 Jan 2013 | 7 comments
With mobility and the cloud dominating today's computing landscape, IT needs to examine new methods of ensuring trustworthy access, including risk-based authentication methods that strike a balance between robust security and accessibility. ...
Blog Entry by Marty Jost | 10 Dec 2012 | 0 comments
Enterprise Cloud adoption continues to accelerate. It’s no longer a question whether the Cloud will gain acceptance but how quickly and broadly it will spread. The cost advantages that Software as a Service (SaaS) delivers make it widely attractive as ...
Blog Entry by Marty Jost | 03 Nov 2012 | 0 comments
A recent BBC article has shed further light on the fact that not all online security companies or products are created equal. According to the article, hackers have found a way around some banks’ two-factor authentication security devices and have gained ...
Blog Entry by Marty Jost | 05 Apr 2012 | 1 comment
According to a recent iPass Mobile Enterprise Report , iPhones are now more popular in enterprises than Blackberry and Android phones. With the growing popularity of iPhones and iPads in the workplace, it’s important that these tools have high quality ...
Blog Entry by Marty Jost | 24 Feb 2012 | 2 comments
This past year provided many important lessons in online security and protection. Based on these lessons and because of the numerous cyberattacks and threats in 2011, many organizations and businesses are currently revamping their online security ...
Blog Entry by Marty Jost | 09 Feb 2012 | 3 comments