Information Security – May 2014

Information Security – May 2014

Cover

As industry players such as Google, Microsoft and RSA work on stronger authentication methods that strive to keep personally identifiable information on the client, how will the evolution of two-factor authentication affect enterprise technologies? We look at the security implications of the open FIDO specifications and a range of emerging FIDO-ready technologies that can help security professionals track key developments as adoption of password-free authentication moves a step closer. We also report on the evolving roles of CISOs after the Target breach, and renewed calls for federal legislation on data collection and breach notification. Columnist Marcus Ranum interviews Georgia Weidman about pen testing and network compromise. 

Vendor:
SearchSecurity.com
Posted:
30 Apr 2014
Published:
30 Apr 2014
Format:
PDF
Length:
33 Page(s)
Type:
Ezine
Language:
English
Already a Bitpipe member? Login here

Download this Ezine!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor