How secure is your identity? Can you say with certainty that your passwords cannot be hacked? Admittedly this is a hard question to answer, nothing is ever certain despite best efforts, but what we can do, is apply best efforts. Your identity (who you are, what you do, what you access) whether it is accessing […]
Category: Tweetable
5 Password Hacks from a Cybersecurity Expert
With so many high profile data breaches over the last 12 months, businesses large and small have focused on boosting their cybersecurity. But, employee passwords still remain a major weakness in many organisations’ cyber defences. He comments: “The use of biometric identification, such as fingerprints, iris, voice or facial recognition might be on the rise, […]
Biometric identification: why the ‘silver bullet’ of authentication won’t really mean the death of the traditional password
Biometric identification might be the latest weapon in the cybersecurity battle, but, as the news that people could be unwittingly giving their fingerprints to hackers via peace sign selfies shows, it is not without risk; those risks mean the traditional password won’t be disappearing any time soon. The password has been on its last legs […]
Artificial Intelligence – is it the Answer for Identity Management?
A rise in security breaches due to abuse of access has put the spotlight on Identity and Access Management. So how might Artificial Intelligence shape its future? Identity and Access Management (IAM) is already a key weapon in the security arsenal of many organisations as a way to mitigate against data breaches and manage the […]
5 Overlooked Cloud Migration Security Issues and How to Avoid Them
There is no cloud, it’s just someone else’s computer Moving services and data to the cloud does have its benefits. But there are some key factors not to be overlooked to ensure a successful migration. There a meme that’s been working its way around social media recently, to the effect that ‘there is no cloud, […]