‘Have I Been Pwned’ is for sale, but what is it worth and who will buy it?

‘Have I Been Pwned’ is for sale, but what is it worth and who will buy it?

The question in my mind about Have I Been Pwned has always been about the value of the service aside from the brilliant analysis and PR generated by its creator, Troy Hunt.

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies.

Multi-cloud security the next billion-dollar frontier

Multi-cloud security the next billion-dollar frontier

Constant change is the new normal. Success in today’s multi-cloud world requires greater adaptability and dynamic methods to protect digital identities and preserve trust.

The politics of ‘Have I Been Pwned’

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

Managing identity and access management in uncertain times

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

Leaked 1.4 billion credentials a risk to users and business

Leaked 1.4 billion credentials a risk to users and business

A more nuanced conversation is required to understand the risks that this interactive database poses to organizations.

Risk aware IAM for an insecure world

Risk aware IAM for an insecure world

In a world full of uncertainties and data breaches, IDaaS providers must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction.

3 ways to improve the security of identity and access management

3 ways to improve the security of identity and access management

A highly effective identity and access management program will always deliver business value. However, treating architecture and security as an afterthought can - and often does - result in massive data breaches that have significant...

Load More