Skip to content
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
TELEGRID
TELEGRID
 
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
Home Archive for category "Authentication"

Category: Authentication

NIST’s Tougher Approach to Identity Risk
Authentication, identity and access management

NIST’s Tougher Approach to Identity Risk

By Eric Sharret February 16, 2018 February 26, 2018

According to Verizon’s 2017 Data Breach Investigations Report (DBIR), “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” The National Institute of Standards and Technology (NIST) understands this. This is why, I believe, they …

Read more"NIST’s Tougher Approach to Identity Risk"
Authentication Token Cybersecurity and NIST 800-63-3
Authentication, Cyber Security, identity and access management, mobile security

Authentication Token Cybersecurity and NIST 800-63-3

By Eric Sharret December 7, 2017 February 5, 2018

In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting …

Read more"Authentication Token Cybersecurity and NIST 800-63-3"
Active Directory Cyber Attacks
Authentication, Cyber Security

Active Directory Cyber Attacks

By Eric Sharret August 30, 2017 February 5, 2018

Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your …

Read more"Active Directory Cyber Attacks"
Should I protect my possessions or my identity?
Authentication, Cyber Security

Should I protect my possessions or my identity?

By Eric Sharret December 20, 2016 February 5, 2018  authentication, cybersecurity, identity and access management

Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to …

Read more"Should I protect my possessions or my identity?"
LinkedIn Phishing – Are your employees safe?
Authentication, Cyber Security

LinkedIn Phishing – Are your employees safe?

By Eric Sharret November 1, 2016 September 19, 2017

LinkedIn Phishing – Are your employees safe? It all started as a harmless exchange between like-minded adults.  It was something I had experienced many times before either at work or in the privacy of my …

Read more"LinkedIn Phishing – Are your employees safe?"
Ryan Lochte and Cybersecurity Sales
Authentication, Cyber Security

Ryan Lochte and Cybersecurity Sales

By Eric Sharret September 15, 2016 February 5, 2018

What Ryan Lochte Can Teach Us About Selling Cybersecurity Tools

Read more"Ryan Lochte and Cybersecurity Sales"
Why is Cybersecurity So Slow?
Authentication, Cyber Security

Why is Cybersecurity So Slow?

By Eric Sharret August 19, 2016 February 5, 2018  cybersecurity, identity and access management, multi-factor authentication, network performance

Do cybersecurity vendors consider user experience? We need to start designing solutions based on both network protection AND network performance.

Read more"Why is Cybersecurity So Slow?"
Does the death of the CAC mean the death of PKI?
Authentication, Cyber Security

Does the death of the CAC mean the death of PKI?

By Eric Sharret July 18, 2016 February 5, 2018  authentication, common access card, cybersecurity, public key infrastructure

The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years. If there is no more CAC how can the DoD maintain its PKI?

Read more"Does the death of the CAC mean the death of PKI?"
Assured Identity – Giving Apps the Finger
Authentication, Cyber Security

Assured Identity – Giving Apps the Finger

By Eric Sharret May 2, 2016 February 5, 2018

I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility.  The DoD’s Public Key Infrastructure (PKI) is well established as …

Read more"Assured Identity – Giving Apps the Finger"

CONNECT WITH US!

Facebook
Twitter
YouTube
LinkedIn
Back to Top
Powered by Fluida & WordPress.