R-Evolution: The Evolution of Risk

Ten years ago, when a user needed to access a corporate application, his or her usage was on a company-owned device and typically confined to company-owned networks. These applications were nicely tucked behind corporate firewalls, and managed by dedicated IT organizations. To identify themselves, users would often enter complex, lengthy passwords when accessing such resources,…

The post R-Evolution: The Evolution of Risk appeared first on Speaking of Security – The RSA Blog.

Continue reading R-Evolution: The Evolution of Risk

Slow Down! You’re in a Public Environment

These days, if you’re planning to spend time at an airport terminal or a coffee shop – it’s likely that you’ll look for a public Wi-Fi hotspot to connect to, and perhaps a charging station, to make sure you don’t run out of power. While our distraction level is  high when we’re out and about…

The post Slow Down! You’re in a Public Environment appeared first on Speaking of Security – The RSA Blog.

Continue reading Slow Down! You’re in a Public Environment

Continuous Identity Assurance Allows You To Step Away

Have you ever wondered how do applications know if “its still you” 10 minutes after you log in to the app? Suppose you have to join a conference call, leave for a meeting, or take a bio break. As far as the app is concerned, since you haven’t performed any activity for a given period…

The post Continuous Identity Assurance Allows You To Step Away appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Continuous Identity Assurance Allows You To Step Away