Remove Authentication Remove Security Remove Social Remove Systems Administration
article thumbnail

53 Questions Developers Should Ask Innovators

TechEmpower - Information Technology

Are there other founders, business leaders, partners, or administrators? Ads, Viral/Social, SEO)? Registration Do you plan to support Google Sign-In, Facebook Connect, or similar 3rd-party authentication? If so, will you also have your own account system? Social Interaction Do users/members relate to one another?

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

Cyber security is one of the highest priority topics for organizations today. However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security.

How To 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Architecture of Identity Systems

Phil Windley

Locke argued that "sovereign and independent" was man’s natural state and that we gave up freedom, our sovereignty, in exchange for something else, protection, sociality, and commerce, among others. This question of power and authority is vital in identity systems. We can ask "what do we give up and to whom in a given identity system?"

article thumbnail

New York: Cyberattack Is Twitter's Fault, Let's Increase Regulation

SecureWorld News

It was the summer cyberattack that had social media buzzing. A group of teenagers used social engineering to breach Twitter's network and take over the accounts of a whole bunch of A-listers. New York should increase cybersecurity regulations as a result, especially for social media companies. You could lose your data.'.

Media 99
article thumbnail

Can the Digital Future Be Our Home?

Phil Windley

And yet those systems are not ours, but rather belong to the companies that provide them. I call these systems "administrative" because they are built to administer our experience in a particular domain for the administrator's specific purposes. Not altogether unpleasant, but a far cry from authentic.