• Password Mismanagement is the Leading Access Control Problem

Password Mismanagement is the Leading Access Control Problem

16th August 2016

With or without the help of a password hacking tool, it is far too easy for passwords to be comprom [...]

Read More
  • The Problem with Passwords

The Problem with Passwords

12th July 2016

We’ve all grown extremely comfortable with passwords, accepting their faults and flaws along the way [...]

Read More
  • Death of the password?

Death of the password?

6th January 2016

Earlier this week the Daily Mail reported on KPMG’s cyber security predictions for 2016. The article [...]

Read More
  • PEGRight brings Ping Identity and Netskope together to mitigate the threat of compromised email addresses

PEGRight Brings Ping Identity and Netskope Together to Mitigate the Threat of Compromised Email Addresses

13th October 2015

Today, at Ping Identity’s IDENTIFY 2015 event in New York City, we’re excited to introduce a solution that increases security and prevents costly security breaches by mitigating the threat of compromised user accounts. .

Read More
  • Identity and access management

Do You Know Who to Trust?

10th August 2015

In April, as a precursor to RSA, I published a blog that suggested the collective security community should be challenging the status quo and not succumb to the pressures of culture (Can Change in IT Security Win the Cultural Battle).

Read More
  • Detection of security breaches

They Will Get In – When Will You Know?

20th May 2015

If you made the trek from SFO to downtown San Francisco during the week of RSA, you may have seen a LogRythm billboard on Highway 101, declaring “They Will Get In.” And if you were really lucky, it may have been printed on your hotel key – eye catching and yet a little unsettling.

Read More
  • Can Change in IT Security Win the Cultural Battle?

Can Change in IT Security Win the Cultural Battle?

15th April 2015

This years RSA Conference theme is “Change: Challenge today’s security thinking,” asking attendees to challenge the thought and procedure status quo and come up with new ways to secure the digital future.

Read More
  • Frictionless Authentication Solution

Webinar Replay: Are Passwords and MFA Really Enough?

13th January 2015

Without a proactive security strategy, misuse of lost or stolen credentials can go undetected for months.  And by that time, the damage is done.

Read More