The Business-Technology Weave:

authentication

1

December 5, 2011  8:26 AM

PC Magazine’s “The 25 Worst Passwords of 2011”



Posted by: David Scott
authentication, computer password, content security, data breach, data security, data theft, identity theft, online credentials, online security, password security, user ID, worst passwords, worst passwords of 2011

 

April 28, 2011  7:44 AM

Security, Sony, and Station (PlayStation), Part 45



Posted by: David Scott
authentication, authentication questions, cost of data breach, credential information, credentialing information, credit card breach, credit card data, data breach, data breach expense, data compromise, data control, ID, login, password, playstation, Sony, Sony PlayStation, user data, user ID

 

Just kidding – it’s only Part 2.  (Please see first...


March 14, 2011  11:26 AM

Mobile Access: Make it selective and effective



Posted by: David Scott
authentication, data encryption, device authentication, firewall, mobile access, mobile broadband, mobile device, mobile security, router, security policy, virtual-private-network, vpn

 

Security is always a delicate balance:  You need to provide...


August 21, 2010  10:35 AM

A New Security Wrinkle



Posted by: David Scott
authenticating questions, authentication, authentication questions, bank security, data breach, data security, data theft, financial security, ID theft, info security, information security, security plans, security policies, security policy, security question, security questions

 

Something interesting happened to me the other day.  There was an...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: