Why Do We Still Use Passwords? | Government Technology Magazine | Nov 2013 |
Identity Management In The Cloud | Dark Reading | Oct 2013 |
Cloud Identity Summit 2013: Standards Making Progress | Windows IT Pro Magazine | Jul 2013 |
When Active Directory And LDAP Aren’t Enough | Dark Reading | Mar 2013 |
Is Identity The New Perimeter? | Dark Reading | Feb 2013 |
Avoiding IAM’s Biggest Blunder | Dark Reading | Jan 2013 |
Single Sign-On Mythbusting | Dark Reading | Jan 2013 |
Three Security Snags That Expose The Database | Dark Reading | Apr 2012 |
Creating a key for every door | ZDNet | Apr 2012 |
Passphrases A Viable Alternative To Passwords? | Dark Reading | Jan 2012 |
The Top 5 Cloud Vulnerabilities | Your Security Resource | Jan 2012 |
Five Worst Practices In Database Encryption | Dark Reading | Oct 2011 |
Cloud IAM catching on in the enterprise | TechTarget | Sep 2011 |
Getting the band together again: Thor Technologies veterans reunite at Identropy | NetworkWorld | Jul 2011 |