Newest ATE Answers Posted on SearchSecurity
My newest bunch of Ask The Expert questions were posted this week on TechTarget's SearchSecurity web site:
Can tokenization of credit card numbers satisfy PCI requirements?
This question posed on 31 August 2007
How can the combination of biometrics and electrophysiological signals be used for authentication?
This question posed on 23 August 2007
Is third-party software the only way to prevent access within a domain group?
This question posed on 15 August 2007
Choosing from the top PKI products and vendors
This question posed on 08 August 2007
How should sensitive customer data, such as driver's license information, be handled?
This question posed on 03 August 2007
Is there a way to bridge physical and logical security without using smart cards or biometrics?
This question posed on 30 July 2007
How do anonymous credentials and selective disclosure certificates affect enterprise IAM?
This question posed on 27 July 2007
Does single sign-on (SSO) improve security?
This question posed on 17 July 2007
What are the pros and cons of using keystroke dynamic-based authentication systems?
This question posed on 09 July 2007
What mistakes are made when implementing enterprise IAM systems?
This question posed on 01 July 2007
Can tokenization of credit card numbers satisfy PCI requirements?
This question posed on 31 August 2007
How can the combination of biometrics and electrophysiological signals be used for authentication?
This question posed on 23 August 2007
Is third-party software the only way to prevent access within a domain group?
This question posed on 15 August 2007
Choosing from the top PKI products and vendors
This question posed on 08 August 2007
How should sensitive customer data, such as driver's license information, be handled?
This question posed on 03 August 2007
Is there a way to bridge physical and logical security without using smart cards or biometrics?
This question posed on 30 July 2007
How do anonymous credentials and selective disclosure certificates affect enterprise IAM?
This question posed on 27 July 2007
Does single sign-on (SSO) improve security?
This question posed on 17 July 2007
What are the pros and cons of using keystroke dynamic-based authentication systems?
This question posed on 09 July 2007
What mistakes are made when implementing enterprise IAM systems?
This question posed on 01 July 2007
0 Comments:
Post a Comment
<< Home