In our first post in this series, we talked about authentication: verifying whether someone is who he or she claims to be. In many instances, this is where system administrators call it a day, by ...
Value stream management involves people in the organization to examine workflows and other processes to ensure they are deriving the maximum value from their efforts while eliminating waste — of ...
In a not so past life, I worked with a large team of software developers at a rather large company. As part of the development leadership team, one of the goals I had set was to constantly broaden and ...
Twitter reportedly is getting ready to roll out two-factor authentication in the coming weeks—a development that comes not a moment too soon as the company’s current security efforts fall short. The ...
The separation of environments and the management of identities (i.e., service accounts, user accounts, administrative, etc.) are being taken up under the auspices of entitlements management in more ...
CrowdStrike has signed a $740 million deal to buy identity security startup SGNL. The move underscores the growing threat of ...
Arcitecta, the data management software company, is releasing Mediaflux Pocket, a new multifactor authentication and authorization (MFA&A) application designed to address the myriad issues associated ...