The FIDO Alliance, formed just four years ago to find a better way than passwords for online authentication, is promoting a standard that keeps user credentials only on the user device. An attacker would have to steal your device to hack your account, they say.
Risk Management / Features
IT organizations are in search of talent, but they are finding that the agile methodology is great for attracting and retaining the next generation of engineers and developers.
2016 is the year of talent -- how to find it, retain it, engage it and motivate it are at the top of organizations' to-do-lists. Here, workforce management experts share their predictions for the coming year.
CIOs are scrambling to purchase cyber-insurance, but the need may be outpacing a market that continues to evolve in the face of significant cyberattacks.
Major connectivity issues are bound to happen sooner or later. Will your employees be able to keep working, or is an Internet outage a prelude to sending everyone home for the day?
The role of a modern CIO is as misunderstood as it is important. So we asked a few of them to take us through a typical day. Here, four IT leaders share their tips, tricks and daily routines.
There's a reason the theme song at this year's Open Business Conference was 'Happy.'
Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world.
One of the earlier business applications to analyze massive volume of data from a variety of sources is IT forensics. Besides using traditional eDiscovery tools to handle unstructured data and analytical tools to analyze transactional data separately, IT forensic experts are turning towards big data for a comprehensive approach to speed up analysis.