Friday, May 14, 2021
Learn what's the key information you need from the 2021 Verizon Data Breach Investigations Report.
Friday, June 5, 2020
On the surface, access seems like a binary decision. Should this person access this application or resource? Yes or no? But as applications and systems increase in value and sensitivity, the types of questions you need to ask change.
Thursday, May 14, 2020
Like all the best technology companies, when you learn what they do and the basics of how they do it, you think: “Why hasn’t anyone done this before?”
Thursday, May 7, 2020
The average employee now has 191 passwords. How did we get here?
Friday, May 1, 2020
How could having no password be more secure than having a password? Isn’t that like removing the lock on your door for the sake of convenience? For those familiar with the principles of asymmetric cryptography, the answer to those questions may be obvious, but for the rest of you I have written up…
Tuesday, April 21, 2020
Look, I know this is over, I know you found something better and I honestly can’t say it’s a surprise. The writing has been on the wall (and the sticky notes on your monitor) for a while now.
Tuesday, April 14, 2020
The Origin of Beyond Identity: Why it took 25 years to adapt asymmetric cryptography to address the password problem.