Information Security Leader, Author, Instructor and Speaker

Default utility Image

It’s Time to Question Longstanding Password Security Best Practices TAGS: | Nobody likes password policies. IT leaders dislike reminding users to yet again change their passwords, then bracing for an onslaught of angry …Continue reading →

Default utility Image

IDC PlanScape: Deploying Multifactor Authentication TAGS: “Multifactor authentication is a time-tested approach that is finally coming of age,” says Mike Chapple, adjunct analyst with IDC’s IT …Continue reading →

Default utility Image

Closing the Cybersecurity Generation Gap TAGS: | | | Businesses around the world find their workforces increasingly divided along generational lines.  As the Boomer generation nears retirement, they find …Continue reading →

Default utility Image

5 Security Must-Knows for Windows 10 TAGS: | | | Microsoft’s September release of the Windows 10 operating system caused a flurry of media activity centered around security and privacy …Continue reading →

Default utility Image

Multifactor Authentication and Smartphones TAGS: | For decades, organizations have used security tokens to provide added security for sensitive IT resources.  Traditionally, these keyfobs were small …Continue reading →