Profile cover photo
Profile photo
Simon Moffatt
32 followers -
Infosec / Identity / Access
Infosec / Identity / Access

32 followers
About
Posts

Post has attachment
Cyber Security Skills in 2018
Last week I passed the EC-Council Certified Ethical Hacker exam.  Yay to me.  I am a professional penetration tester right?  Negatory.  I sat the exam more as an exercise to see if I “still had it”.  A boxer returning to the ring.  It is over 10 years since...

Post has attachment

Post has attachment
The Role Of Mobile During Authentication
Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app.  Examples include Google’s Authenticator, Facebook’s options for MFA ...

Post has attachment

Post has attachment

Post has attachment
How Information Security Can Drive Innovation
Information Security and Innovation: often at two different ends of an executive team’s business strategy. The non-CIO ‘C’ level folks want to discuss revenue generation, efficiency and growth. Three areas often immeasurably enhanced by having a strong and ...

Post has attachment
December Auth Node Roundup
December Auth Node Roundup
theidentitycookbook.com

Post has attachment
2020: Machine Learning, Post Quantum Crypto & Zero Trust
Welcome to a digital identity project in 2020! You'll be expected to have a plan for post-quantum cryptography.  Your network will be littered with "zero trust" buzz words, that will make you suspect everyone, everything and every transaction.  Add to that,...

Post has attachment

Post has attachment
Ghost-Banning and Dynamic Personalisation During Login
So that is a bit of a title.  What’s that all about then?  Login journey’s, especially from a consumer identity and access management (CIAM) or digital identity perspective have become must more complex.  Fine grained authentication has started to take over...
Wait while more posts are being loaded