Have you ever wondered how an application or device knows who you are and how things like Single Sign-On (SSO) work? Today’s IT landscape involves business applications hosted on remote servers and accessed from devices ranging from desktop workstations to portable devices to smart phones, all interconnected though web-based communications protocols. This reality presents significant […]
IT Security

ABAC is coming (a)back.
The Government has previously shown a considerable interest in Attribute Based Access Control (ABAC) as a means to improve information sharing and IT security. For those not aware, ABAC is a method of logical access control where a subject’s request to perform operations on objects is granted or denied based on the attributes assigned, the […]

Security Training: Even your grandmother needs it
Recently, an eMentum employee’s 84 year old grandmother asked him to fix her computer for her. It was “acting slow”. After a brief investigation, he discovered no less than 400 pieces of malware on her computer, using virtually all of her system resources and a significant portion of the home’s internet bandwidth. After cleaning up […]