I applaud Apple for continuing to refine the process for verifying identity with their devices and managed accounts. Identity and Access Management is an ever evolving discipline and should be taken seriously by everyone. Social engineering techniques continue to grow and evolve as well making this a constantly changing and difficult battle, but one certainly worth fighting.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page