Note the subtle play on words there? Is cyber security a huge mess of complexity or are we heading for a huge opportunity to integrate and manage disparate technology via an adaptive mesh? The concept of a cyber security mesh seems to have emerged from the lips (or pages) of Gartner – perhaps as early […]
An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going strong at the same time. Very smart. I was lucky (?) enough to have been in the RBAC space the first time ’round […]
An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
I recently ran another of my highly scientific polls on cyber security technology opinions last week that asked the question as to whether passwordless authentication still classified as multi factor authentication (MFA). I dropped the polls into LinkedIn and Twitter here. It generated some interesting responses. Before we dive into that, let me set the […]
Our founder Simon Moffatt will be running a consumer identity and access management masterclass workshop at this month’s Chartered Institute of Information Security live event. The two day cyber security extravaganza will feature some of the world’s leading information security experts – with headliners including Bruce Schneier (Security Veteran and Crypto Expert) Phil Venables (Google […]
A few weeks ago I ran a slightly provocative and not very scientific poll on LinkedIn asking which was the more important: authentication or authorization? Clearly in the grand scheme of things that is a pretty pointless exercise, but the rationale was to really identify some thought processes and reactions. It provided some interesting responses. […]
Let us start with a few definitions just to get started. Authentication is focused upon asserting the properties of an entity and confirming a level of assurance. The typical process of signing in or logging in. Clearly authentication for people is quite a well known process, as we perform the task every day – sometimes […]