Remove Authentication Remove e-Discovery Remove Encryption Remove Mining
article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

For years identity management has relied on three factors for authentication: What one knows (passwords). In this blog post, and in one by my colleague Sandy Carielli from Entrust Datacard, we discuss big data analytics and how it is enabling the evolution of new behavior-based authentication for easier and more robust identity management.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

I've been directly involved in the discovery or disclosure of a heap of these and indeed, security is normally the thing I most commonly write about. Yeah, me either, because most of mine are probably like yours: the simplest electrical devices in the house. The vulnerability is the result of weak encryption used by TP-Link.

IoT 143