Büro des CTO

Mistaken Identity: Ransomware, Facial Recognition, and Liz Wharton

Lawyer, cybersecurity, and privacy maven Liz Wharton regales us with tales of her hand-to-hand combat experience with the Atlanta ransomware of 2018 and then unfolds the current state of facial recognition in all its manifold splendor (and we didn’t even get to cover the security of drones, yet another of […]

PSD2 und Zwei-Faktor-Authentifizierung: eine doppelte Sicherheitsherausforderung für Banken

Am 14. September 2019 trat die PSD2 in Kraft. Open Banking wird somit in den Finanzstrukturen unserer Gesellschaften eine immer größere Rolle spielen. Die vollständige Umsetzung dieses Konzepts bietet zwar innovatorische Chancen, stellt aber auch eine gewaltige datenschutzrechtliche Herausforderung dar. Eine Gelegenheit für Innovationen – Das Öffnen [...]

Der Kern der Identity

What’s the definition of a core? Years ago, there was this cheesy movie about the possible destruction of the planet. Side note: it was a weird time then. We were obsessed with making movies about the billion ways we would all die… anyway, I digress. But in this cheesy movie, […]

Das Bernoulli-Prinzip: Epidemiologische Modelle für Identity

Smallpox is one of the deadliest diseases in all of human history. If you contracted Smallpox in the 18th century, you would have a one in three chance of dying within sixteen days. In the 20th century alone, Smallpox killed over 500 million people. Fortunately, it’s also the only infectious […]

Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms

Who was the real Tarra Simmons? On November 16, 2017, she sat before the Washington State Supreme Court. The child of addicts and an ex-addict and ex-felon herself, she had subsequently graduated near the top of her law school class. The Washington State Law Board had denied her access to […]

A Portent of Privacy

It was not the first such event, nor will it be the last. At 11:41 p.m. on January 20, 2019, the bright Austin night slipped into shadow as the full moon took on a deep crimson hue. The total lunar eclipse lasted only 62 minutes, but its effect on the […]

Leitfaden 2018 für Weihnachtsgeschenke für sicherheitsbewusste Kinder

By choosing wisely this season, you can not only get popular toys that your little ones will love, but you can also foster a security mindset in your children. The following toys are the top 2018 options that harness the power of play to ensure that the next generation is […]

Das Geschäft mit der Cybersicherheit

I want to ask you a question, and I want you to take a minute to think about it before you answer really. Are you ready? There is a right answer, although it may not be what you think. IT security, cybersecurity, whatever we want to call it these days […]

Mistaken Identity: Zero Trust, Full Identity, Can’t Lose

With apologies to Friday Night Lights, David Lee and Mike Kiser welcome back Darran Rolls, CTO and CISO of SailPoint, to discuss the central role that identity plays in implementing zero trust security models: to fully embrace zero trust, a comprehensive concept of identity is essential. Headlines include the well-orchestrated […]

Do the Right People Have the Right Access to the Right Data, at All Times?

At face value, it’s a simple question. But it’s one that most organizations struggle to answer.  This question is a restatement of what identity is.  Yet after twenty years of various identity management platforms and approaches, many organizations do not have a satisfactory answer to this question. Right People To […]

How much money
can you save?

Find Out Now