Stephen Wilson

Send feedback to Stephen Wilson



Recent articles for Stephen Wilson

Identity management and the iPhone 5s 
Sep 20, 2013 | Comment Now 
Opinion: Why NFC trumps biometrics.
 
iPhone 5s : Does the 's' stand for security? 
Sep 19, 2013 | Comment Now 
Opinion: Why NFC trumps biometrics.
 
Feds try to elevate 'social log-on' for payments 
Nov 12, 2012 | Comment Now 
Why you should accept the Document Verification Service.
 
A new theory of digital identity 
Mar 14, 2012 | Comment Now 
The final instalment of a two-part feature series explores the troubled practice of federated identity.
 
A new theory of digital identity 
Nov 30, 2011 | Comment Now 
Stephen Wilson puts digital identity under the microscope.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1149

Vote