Amid a rash of serious security breaches, President Obama heads to Stanford University on Friday to host a high level cybersecurity summit with top tech, industry, regulatory, legal, and academic experts....More
User authentication plays a central role in password resetting. Passwords are still the most popular user authentication method even though they are proven to be notoriously weak due to the fact that they are managed by people – the weakest link in the security chain. Its human nature to choose weak passwords that can be remembered easily, however such passwords can also be easily hacked. ...More
Are you familiar with Albert Einstein’s definition of insanity? One can make the case it applies to IT pros that haven’t embraced centralized IT management – a game-changer that can transform your business.
But first, a quick refresher: Einstein said insanity is “doing the same thing over and over again, and expecting different results.” ...More
Maybe I'm just getting grumpy and mean as I get older. Maybe that's why I'm using the word "failure" so much of late. After all, I did recently celebrate my 43rd birthday - so maybe I'm just transforming from a semi-sane person into a mean old man that sits on his porch and shouts at kids to get off his lawn....More