2 Minutes On

2 Minutes On

IoT Security: The EdgeX Advantage

It’s the best of the internet of things and the worst of the internet of things: unprecedented connectivity that creates both tremendous opportunity and considerable risk. In an environment extending from sensors and devices at the network edge to applications and services in the cloud, an end-to-end IoT ecosystem is essential to realizing opportunity without…

Face-to-Face with Centrify CEO Tom Kemp

SC Media spoke with Centrify CEO Tom Kemp about the future of identity and access management. Here’s what he had to say. SC Media: During your talk at a Cloud Security Alliance forum at RSA earlier this year, you spoke at length about the fact that users have too many passwords and too many privileges.…

Too many passwords and privileges key to data breaches

In a world of growing data breaches where enterprises are being hit constantly by phishing, malware and other attacks on all aspects of their environment, one variable remains constant: compromised credentials remain the most popular vector of attack. Of the $75 billion being spent on information security this year, just $5 billion is being channeled…

Next post in 2 Minutes On