Smart Office Controls

Forget light switches and thermostat buttons in the office. IoT sensors can control when lights go on and off, as well as heating and cooling in the office. Lights can go on and off based on your location.

Seven ways to fail your first consulting interview

Interviews are inherently challenging and stressful for candidates, and everyone makes mistakes during an interview. Avoiding these seven common mistakes does not guarantee that a candidate will not advance to the second interview at a consulting firm; however, candidates who commit multiple of these (particularly concurrently) won’t be asked back.

IAM market consolidation looms in 2017

Our fifteen-year legacy of organizations implementing the relevant regulatory standards and still suffering cyber security breaches has led forward-thinking organizations to focus on risk management rather than compliance for compliance’s sake.

Launch your own privileged insider attacks for under $1,500 USD

This article will examine the costs and budgetary considerations for a new bad actor, lacking global resources, to set up a single privileged identity theft campaign to be able to launch insider attacks. The costs shown will assume corporate targets in the greater Seattle metropolitan area. This article will also briefly examine countermeasures.

The good news is that it is still possible to become an evil villain for an initial investment of under $1,500 USD, despite rising labor costs.

@Pebble is Shutting Down. Can They Take Two-Factor Authentication for #Cybersecurity With Them?

However, the biggest utility for my Pebble was two-factor authentication from my bank. My bank has had a somewhat tortured Consumer Identity and Access Management rollout over the years. They initially had single-factor authentication – a username and password. They briefly flirted with pictures, until they realized the Internet has an insatiable love of cats. They then deployed Knowledge-Based Authentication, safe in the knowledge that no-one would post their first spouse’s name, the name of their elementary school, and their favorite band on Facebook. Thus, they reluctantly deployed SMS-based two-factor authentication.