Gartner Blog Network

Category: 'authentication' Blog Posts

from the Gartner Blog Network

Mobile Device Certificate Enrollment: Are You Vulnerable?

by Mark Diodati  |  July 2, 2012

Last week, US-CERT published a vulnerability note on the Simple Certificate Enrollment Protocol (SCEP). The vulnerability was reported by Certified Security Solutions, a consulting company with extensive Windows and PKI...

Read more »

RSA SecurID, Crypto, and Satan’s Computer

by Mark Diodati  |  June 27, 2012

You may have read about two recent vulnerabilities associated with RSA authentication products. Last month, a researcher specified how to copy a SecurID software token from one computer to another,...

Read more »

It’s … Minty

by Mark Diodati  |  May 7, 2012

Recently, I had the opportunity to talk with Sharon Epperson (CNBC/Today/NBC News). She was preparing for a Today show segment on the security of I address this topic in...

Read more »

The Next Revolution In Mobility: Near Field Communication

by Mark Diodati  |  April 20, 2012

I want to welcome you to a multi-post discussion about near-field communication (NFC). Over the next few blog posts, I will be talking about: NFC’s moving parts Impending demand from...

Read more »

OTP Systems And Mobile Devices: Don't Make The Biggest Implementation Mistake

by Mark Diodati  |  April 12, 2012

The topic of the secure distribution of one-time password (OTP) secrets recently surfaced again as part of our ongoing mobility research. Many organizations make the classic distribution mistake; they couple...

Read more »

Commentary on Centrify's new MDM product

by Mark Diodati  |  February 19, 2012

Industry analysts discuss emerging concepts and current events with journalists. We are misquoted more than you might think (or we would like). Sometimes the misquote is minor. On occasion, the...

Read more »