June 5, 2014
Learn how to read the video stream you set up in the first part of this tutorial and accept it at the remote location.
May 6, 2014
This article presents a programmatic solution to the problem based on adding permissions to the files.
May 5, 2014
Some policies must be enforced across organizational and technical silos.
April 29, 2014
Learn how to configure the client machine (the one to which the camera is attached), to read the stream from your camera and make it accessible from a remote location via network or internet.
February 26, 2014
This tutorial explians how to use the REST API and OAuth together in order to create a secure web service.
February 24, 2014
Delegate control of each Internet of Things node locally to the node itself.
February 10, 2014
We’ll need more than a handful of leaders showing the impressionable masses the way to the light.
January 31, 2014
According to the <em>Symantec Internet Security Threat Report for 2013</em>, web-based attacks compromised more than 93 million identities last year. Now, more than ever, is a good time to pay more attention to properly securing your website. Explore these tips and techniques that will make your site a tougher target for attackers.
January 7, 2014
Companies often understand that AD FS is the right tool to create a secure network for managing resource requests from both internal and external users, but fail to position it in a reliable fashion. In my first post today, I will explain a set of generic guidelines to help you optimally configure AD FS in your farm environment.
December 19, 2013
Kaseya will have a true “Cloud on the device” that I believe is the future of BYOD.
December 12, 2013
Given the recent row in the usually staid Public Key Infrastructure (PKI) world, when the Government of France was caught red-handed with forged SSL certificates, can we trust PKI at all anymore?
November 20, 2013
Verizon’s Managed Certificate Services are a good starting point, but there’s much more work to be done as there's no new technology here.
November 19, 2013
Neither Salesforce nor anyone else really has a clue how to secure the IoT.
September 23, 2013
Who should we blame if we don’t like what the NSA has been up to? Congress.
September 10, 2013
There’s no place to hide. There are no more secrets.
August 15, 2013
It’s not a technology problem. It’s a governance and public policy problem.
August 13, 2013
If you believe that Bitcoin is good for anything other than paying hackers to find weaknesses, then you’re in for a rude awakening.
August 8, 2013
Don’t count on this simple technique to mitigate the insider risk