According to IBM a consistent way to manage all types of risk is the key to success for financial services organizations. To support this IBM will be rolling out their Smarter Risk offering during Q1 2014. Failure to properly manage risk has been alleged to be the cause of the financial crisis and, to force […] READ MORE
Is there really no way to avoid shared user accounts?
In various discussions over the past month, mainly in the context of Privilege Management, I raised the (somewhat provocative) claim that shared accounts are a bad thing per se and that we must avoid these accounts. The counterargument I got, though, was that sometimes it is just impossible to do so. There were various examples. […] READ MORE
Safer, stronger authentication
In my last post (“Dogged Determination”) I briefly mentioned the FIDO alliance (Fast Identity Online) with the promise to take a closer look at the emerging internet password-replacing-authentication system this time. So I will. But first, an aside. It’s quite possible that the alliance chose the acronym “FIDO” first, then found words to fit the […] READ MORE
The World is your Datacentre
I’ve worked in Security for many years, specialising in Network and Data Security, largely by chance, following my interests and the market in equal measure. I started with authentication tokens and SSL acceleration devices back in the early 2000s, the latter market mutated into key and certificate management, encryption of various types hanging off these […] READ MORE
Oracle OpenWorld ’13 Part 2 of 2 – going for more than the Americas Cup?
It is now nearly a month since Oracle OpenWorld 2013 closed and Oracle Team USA made an incredible win in the 34th Americas Cup. Both events have been amazing experiences with OpenWorld attracting more that 65000 attendees and Oracle Team USA coming back from certain defeat to a mind-blowing win. While I am a huge […] READ MORE
One of my favorite movies released in 2012 was Cloud Atlas. This is not necessarily an easy movie to watch or explain. That is not the point I bring it up. In one of the films many timelines, there is a post-apocalyptic setting where civilization is very primitive. In this primitive civilization, the two main […] READ MORE
More Unsmart Infrastructures
In my last post I mentionned the motor driven door locks I have at my home. A frequent question I get from friends visiting me is, wether that doorlock system, which works with pincodes, RFID, remote conrols and over the Internet, is connected to the KNX/EIB bus system I also have in my house to […] READ MORE
News from the Analyst Summit in London
Every Summer, Eskenzi PR organizes the IT security analyst and CISO forum. It basically consists of one-on-one meetings between vendors and analysts and round table discussions between vendors, analysts and end-users, typically CISOs. And the event this year was excellent! The quality and density of information is quite high, and it allows to grasp trends, […] READ MORE