The Wall Street Journal reports that the demise of multi-billion-dollar Nortel Networks was largely due to a few stolen passwords. Could the same thing happen to your company? Learn why information security technology can't prevent identity attacks – and learn what will prevent identity attacks.
So ask yourself: Do you think it's possible to determine the intentions and character of the sender of a stream of bits? Isn't that like asking your building's receptionist to determine the intentions and character of everyone who walks through the door?
Of course you wouldn't do that. Instead, you would have her or him issue a badge identifying who is responsible for what happens while they're in the building. It's not about guard dogs and razor wire, it's about accountability.
If your company is relying upon firewalls and intrusion detection systems and intrusion prevention systems and antimalware and security information event monitoring and similar stuff, it is relying upon the assumption that you can determine the intentions and character of the sender of a stream of bits.
In Don't Get Norteled, you'll learn why identity is at least as important as identity management, and you'll learn how to implement a system of pervasive digital signatures from measurably reliable identity credentials.
So ask yourself: Do you think it's possible to determine the intentions and character of the sender of a stream of bits? Isn't that like asking your building's receptionist to determine the intentions and character of everyone who walks through the door?
Of course you wouldn't do that. Instead, you would have her or him issue a badge identifying who is responsible for what happens while they're in the building. It's not about guard dogs and razor wire, it's about accountability.
If your company is relying upon firewalls and intrusion detection systems and intrusion prevention systems and antimalware and security information event monitoring and similar stuff, it is relying upon the assumption that you can determine the intentions and character of the sender of a stream of bits.
In Don't Get Norteled, you'll learn why identity is at least as important as identity management, and you'll learn how to implement a system of pervasive digital signatures from measurably reliable identity credentials.