Your password to everything

Wednesday, 3 March 2004, 12:00 PM EST

There are few people around in the developed world today who would argue that the importance of computer systems has decreased over the last few years. There are even fewer who would be likely to say that the significance of such systems will diminish any time soon.

Enterprises, Organisations, Governments and individuals all rely, to a greater or lesser degree, on the computers and the myriad of applications that they host. With so many people now routinely carrying out significant transactions via the Internet, why has so little attention been paid to the fundamental plank on which all systems ultimately depend for their security, namely identity management, and why is so little action taken to prevent, or at least deter, identity theft?

By Tony Lock at IT Director.

[ Read more ]

Related items




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //