Authentication: The Thieves Already Know the Answers

High profile attacks on federal government information systems have dominated the headlines in recent weeks. While the tactics used to execute these attacks vary, they share a common and unfortunate root cause – our widespread over-dependence on supposed “private” information …

Read More...