BYOD
The PKI Guy talks securing identities with Marina Simakov of Preempt
Q&A with Marina Simakov, security researcher at Preempt TPG: What can organizations do to best protect their organizations now that the bulk of employees are working remotely? MS: Many organizations may have covered the fundamentals of user authentication and security by defining privileged accounts, enforcing restricted access to crown jewel assets, and reducing the attack…
Read MoreAre You Managing Your Secrets?
Do you know where your organization’s secrets are kept? The modern IT landscape is filled with secrets: certificates, cryptocurrency wallets, SQL connection strings, storage account keys, passwords, and encryption keys. Getting a handle on secrets management can be a top challenge. Knowing where secrets are kept in the company is critical – and sometimes easier…
Read MoreBYOD Raises Challenges Around Identity and Access Management
We work in a bring-your-own-devices (BYOD) culture, which raises questions and challenges around identity and access management. Mark was interviewed by Solutions Review about BYOD security issues and what organizations can do. Check out the Q&A.
Read MoreHSMs and the changing PKI Ecosystem
As I head back from the 1st annual Thales HSM User Group (HUG) conference in Chicago, I have been reflecting on the sessions and information that was shared at the conference. There is a ground swell of awareness around information protection and identity assurance. What was once the theoretical concepts of corporate espionage and dark…
Read MoreNearing Release – White Paper on Securing and Hardening NDES for BYOD Solutions
I am working on wrapping up a Microsoft sponsored White Paper entitled – Securing and Hardening Network Device Enrollment Service with Server 2012 R2. The paper is focusing on the new NDES Policy Module and methods to secure and protect the perimeter service. It integrates with Microsoft SCCM an Intune to provide a holistic BYOD…
Read More