My Wishlist For A High Assurance, Adaptive Smartphone Since this is cyber security awareness month, I thought I would do an article about something near and dear to our hearts – the security of our smartphones. A recent article regarding Pentagon plans to approve a smartphone for use at the top secret level got me […]
Endpoints are the new perimeter and greater focus needs to be placed on securing them – especially since actors bent on harm are well aware of this and are increasingly using endpoints as a conduit for their exploits. In this ACD capability area, you can learn why early adopters are turning to data-centric approaches, such as self-protecting data objects, to provide dynamic, contextual protections for endpoint security. Explore which vendors offer active exploit dismantling capabilities as part of their endpoint protection software. In our research section, you can discover new advancements that deal with context-aware adaptations where users can select/create different secure environments for different activities. Also, find out how adaptive security is being addressed for mobile users and the Internet of Things. The Adaptive Endpoints capability area is your guide to active cyber defenses for the next generation of endpoints.
Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors to identity theft. The breach has raised the ire of Congress with numerous hearings about what happened, why it happened, and what are “you” going to […]
Living in a Hostile Cyber World “These are the times that try men’s souls…” – Thomas Paine You are the product manager for a new offering and you just clicked on a link that your boss sent you in an email. Your laptop seems to take longer than usual to reach the link but you […]