On the internet highway, there is often unspoken -- but also unwarranted -- trust between individuals, the confidence that another person will do the right thing or that technology will function correctly within the cyber domain. Today we often operate with blind trust, hedging our bets on the success of state-of-the-art defensive strategies, tools and strengths of the human being.
Physical security is a critical component that must always be accounted for when assessing IT security. That should be obvious, but the point is reinforced by this real-world story of a Caribbean adventure.
We will be exhibiting at the Gartner Identity and Access Management Summit 2013 at the JW Marriott LA Live in Los Angeles November 18 - 20, 2013. Please join us at Booth #102 to learn more about protecting your cloud and on-premises web APIs using policy-based authorization and a secure integrated attribute store.
No one can be two places at once, but that doesn’t stop us from trying! Telos ID will be at two conferences next week: the 13th Annual Aviation Security Summit (November 5-6) in Arlington, Virginia and the FAC Specialty Conference (November 5-8) in Orlando, Florida.
No matter how much technology is thrown at this issue, cybersecurity is still wildly difficult. It requires time, process, oversight, audit, enforcement, policy, hard work, and technology. As with all things, technology will help lighten the load, but you still have to build momentum on your own.
It occurred to me that this insane government shutdown flies in the face of this year’s National Cybersecurity Awareness Month theme: Our Shared Responsibility. Clearly some important people have not gotten the message and are not taking their shared responsibilities seriously. Shared responsibility isn't just about patches, passwords, code, and social engineering. Shared responsibility starts at the top.
With all of the iOS 7 enhancements, it’s easy to become distracted and overlook some of the key privacy settings that are conveniently defaulted to allow maximum exposure of the user’s sensitive content and information.