Month: July 2016
Disruption is everywhere. The S&P 500, normally a bastion of stability, experienced an unprecedented 50 percent churn rate in just the past 15 years. In 1999, General Electric and Coca-Cola were at the top of the list. Today it’s Apple and Google. And look at a company like Uber, which owns no cars and predominantly exists digitally in the cloud. It has a market cap larger than either Ford or GM, which are both still producing physical products. It’s estimated that in the next 10 years, the S&P 500 churn could grow even more, to as high as 75 percent. You can bet that organizations that have successfully implemented digital transformation will be leading the new charge.
In today’s environment, success requires companies to approach every engagement as part of an overarching strategy of executing policies and practices in a digital world. And, as with any transformation, the change brought about by it – and which follows in its wake – can be empowering or destructive. Digital transformation is filled with equal parts danger and opportunity.
Cleverism.com defines digital transformation as the use of digital technology in every aspect of human society and living. They see digital transformation as the third step of a long process, coming after achieving digital competence and then becoming fully digital literate. It’s a good definition as one might expect from a site with ‘clever’ in its name, but what does it mean for IT security and technology as a whole?Read More
Password managers face a daunting task. The creation and management of user access to connected devices, as well as user access and authentication into external and internal applications, databases and networks is riddled with both scalability and security challenges.
Complicating the matter is the fact that user authentication and verification are the cornerstones of any business, and sometimes entire sectors. Adding fuel to this dangerous powder keg, studies every year reveal that the most-popular passwords chosen by users are incredibly inadequate. Obvious passwords like “123456” and “password” always top the lists. What’s worse is the fact that people often use the same weak passwords everywhere, and this bad practice follows most organizations when moving into the cloud.
1. Lack of enterprise features – User authentication and verification is the combination of business process and technology to manage data about users on computer systems and software applications. This management often includes user objects, identity attributes, security entitlements and authentication factors. These tools that manage user identities, however, often lack the capabilities necessary to handle the scalability of always-on and always-mobile modern enterprise networks.Read More