Will We Ever Get Close to 100% Security? – On Location at RSA Conference 2011

Taher Elgamal, CSO, Axway

“We kind of know where the vaccines are going to come from. The mistake that people in information security get into is the perfect solution, a hundred percent ‘something.’ And a hundred percent does not work.”

Is the Future Filled with Data Breaches? – On Location at RSA Conference 2011

Taher Elgamal, CSO, Axway

“We will see a lot of these in our lifetimes, is the reality of it… Most people do not know how to manage information or access to it.”

What About WikiLeaks? What About Stuxnet? – On Location at RSA Conference 2011

Taher Elgamal, CSO, Axway

“This industry started out thinking of information security and migrated into a lot of other things. If we actually go back to information security as it was supposed to be originally, we would not allow people who are not supposed to have access to anything (to get) access to it. And we would not allow people to post things out without having the right to do that as well.”

Policies Driven by the People Who Interact with You – On Location at RSA Conference 2011

Dave Bennett, CTO, Axway

“Authorization today is so much controlled by the enterprise. In the future it’s going to be controlled more and more by the user.”

The Network’s Becoming Intelligent – On Location at RSA Conference 2011

Dave Bennett, CTO, Axway

“I think it goes beyond that. I think we have to start looking at the whole fabric, the whole network, beyond just cloud. How cloud intertwines to your corporate enterprise, how it intertwines to the new social medias, to the ad hoc users.”

Axway CSO Taher Elgamal Posts on LastWatchdog.com: “The case in support of Internet ID proposal called NISTIC”

Axway CSO Taher Elgamal posted a blog post today on LastWatchdog.com, a blog and news site that focuses on IT security. Please take a look and share your thoughts!

“I commend the White House for this idea. They’re thinking about the security of an important feature of the modern world we live in — the Internet — and they’re intent on joining the ranks of governments throughout the world who are asking a simple, all-important question: ‘How do we authenticate users?'”

Integrating with Other Identity Repositories

John Thielens, Chief Architect, Cloud Services, Axway

“Everybody wants me to register. They want to own my credentials so they can have, I guess, some kind of information about me to spam me later, so that they can independently have some assurance over my identity so they can allow me to securely transact. We certainly see this on the enterprise side as well.”

  • Calendar

    • November 2017
      M T W T F S S
      « Feb    
       12345
      6789101112
      13141516171819
      20212223242526
      27282930  
  • Search