Jack Ma, founder of Alibaba Group, China’s largest e-commerce business, once remarked “I’m not a tech guy. I’m looking at the technology with the eyes of my customers, normal people’s eyes.” At Nervepoint Technologies, we are tech people. And we constantly look at technology through the eyes of our customers, many of whom are techies. […]
Keeping it Simple in IT: Attributes of a Good Identification Management Platform
Why make things easy when it’s so easy to make things hard? This question always enters my head when I think of Identity Management. In two decades of covering the Identify Management industry I have seen one company after another build identity management solutions that either over complicate the experience for the network administrator or […]
What are the lessons learnt from password hacking?
Hot off the heals, with the recent hacks on eBay and Gmail, it’s not surprising that we find 2 more respected organisations who’s security has been compromised and leaves data vulnerable to hackers. iThemes iThemes, a favoured website that provides themes and plugins for popular blog site WordPress, have contacted all their users with a notice […]
The Shellshock Q&A
What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]
The Shellshock Q&A
What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]