Reports surrounding the Sony data breach are missing a simple, critical concept. Because user credentials were misused, the Sony breach is similar to the dozens of other recent breaches, from Target to Home Depot to JP Morgan, says Linda S. Millis, a security analyst with government and civilian credentials.
Develop and implement the next generation of Identity Verification and Assured Rights Management for enterprises of all sizes, establishing ourselves as the ultimate response to the worldwide escalation of cyber fraud.
Despite the seemingly endless variety of cyber attacks, in reality, client-server integrity can be compromised
in only two ways:
When one user
to be another.
When a user connects
to one server that
appears to be another.
Eliminate those two possibilities and you eliminate the possibility of cyber fraud.