技術長辦公室

Why Remote Work is Not the New Normal

As we all struggle with Zoom fatigue, Slack overload, and months of not wearing pants (ok maybe not all of us), a very common discussion is whether this is the new normal. I’ve had this conversation with colleagues, friends, and family (ironically largely over Zoom). My perspective is that this shift to fully distributed […]

Mistaken Identity: Ransomware, Facial Recognition, and Liz Wharton

Lawyer, cybersecurity, and privacy maven Liz Wharton regales us with tales of her hand-to-hand combat experience with the Atlanta ransomware of 2018 and then unfolds the current state of facial recognition in all its manifold splendor (and we didn’t even get to cover the security of drones, yet another of […]

PSD2 和雙因素驗證: 銀行面臨雙重安全挑戰

PSD2 的全面授權已於 2019 年 9 月 14 日生效,這意味著開放銀行將繼續進入社會的金融結構。 儘管此概念的全面實現為創新者提供了機會,但它也帶來了特有的隱私挑戰。 創新機會 開放 […]

身分核心

What’s the definition of a core? Years ago, there was this cheesy movie about the possible destruction of the planet. Side note: it was a weird time then. We were obsessed with making movies about the billion ways we would all die… anyway, I digress. But in this cheesy movie, […]

白努利定律 (Bernoulli Principle): 身分的流行病學模式

Smallpox is one of the deadliest diseases in all of human history. If you contracted Smallpox in the 18th century, you would have a one in three chance of dying within sixteen days. In the 20th century alone, Smallpox killed over 500 million people. Fortunately, it’s also the only infectious […]

Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms

Who was the real Tarra Simmons? On November 16, 2017, she sat before the Washington State Supreme Court. The child of addicts and an ex-addict and ex-felon herself, she had subsequently graduated near the top of her law school class. The Washington State Law Board had denied her access to […]

A Portent of Privacy

It was not the first such event, nor will it be the last. At 11:41 p.m. on January 20, 2019, the bright Austin night slipped into shadow as the full moon took on a deep crimson hue. The total lunar eclipse lasted only 62 minutes, but its effect on the […]

2018 年注重安全的兒童節日禮物指南

By choosing wisely this season, you can not only get popular toys that your little ones will love, but you can also foster a security mindset in your children. The following toys are the top 2018 options that harness the power of play to ensure that the next generation is […]

網路安全業務

I want to ask you a question, and I want you to take a minute to think about it before you answer really. Are you ready? There is a right answer, although it may not be what you think. IT security, cybersecurity, whatever we want to call it these days […]

Mistaken Identity: Zero Trust, Full Identity, Can’t Lose

With apologies to Friday Night Lights, David Lee and Mike Kiser welcome back Darran Rolls, CTO and CISO of SailPoint, to discuss the central role that identity plays in implementing zero trust security models: to fully embrace zero trust, a comprehensive concept of identity is essential. Headlines include the well-orchestrated […]