You’re busy. We get that. Let’s suppose you’re like most of your colleagues in security. In that case, it’s almost like Groundhog Day. It starts with chasing the latest threat and protecting your company or agency from attacks. It ends with you wondering where the last eight (or more) hours…
Read More
Imagine being able to manage hundreds of millions of IDs and process billions of logins and other transactions per day. That’s what you can achieve for your organization by using consumer identity and access management, or CIAM. At the same time, your users can manage their data themselves by having…
Read More
As I help my two teenagers figure out what to do after high school, I wonder when a certification is better than a four-year degree. I’ve seen firsthand the pressure among their friends to invest a very large amount of money in college. Meanwhile, the teenager doesn’t really know what…
Read More
I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping school. His class had been canceled after his teacher fell for a phishing attack, and their computer was infected with…
Read More