ulrich.lang@objectsecurity.com

Home|Ulrich Lang

About Ulrich Lang

This author has not yet filled in any details.
So far Ulrich Lang has created 57 blog entries.

How Smart are Smart Cities?

This video is from the first event of our OpenPMF 4.0 Launch: Securing Smart Cities ObjectSecurity CEO Ulrich Lang discusses "securing smart cities" in a panel discussion with fellow security industry leaders (February 7, 2017). OpenPMF 4.0 will be released on February 13/14 during the RSA Show week in San Francisco, CA, USA, during [...]

By |February 7th, 2017|

ObjectSecurity CEO opinion: Cybersecurity Market Failure

We hit the glass ceiling years ago! Hackers are winning unless we change! This slide deck was presented by ObjectSecurity CEO Dr. Ulrich Lang at ISSA Cornerstones of Trust 2015. The cyber security ecosystem is progressing too slowly; few game-changers find adoption. The “good guys” are operating under severe constraints: End-user organizations often cannot [...]

By |January 31st, 2017|

OpenPMF v4.0 Launch Events

ObjectSecurity is proud to release OpenPMF 4.0, a major new product version in mid-February 2017. ObjectSecurity invites you to the OpenPMF 4.0 launch events during RSA Expo week (Feb 13 & 14, 2017) and to our virtual online launch event. ObjectSecurity invites you to the OpenPMF 4.0 launch events, which will be held at Elan Event Venue [...]

By |January 22nd, 2017|

The Need for Better Cybersecurity Prioritization Metrics

Most organizations are overwhelmed, understaffed, and/or underfunded when it comes to cybersecurity. These constraints create a critical need to prioritize on the most critical cybersecurity measures. However, often these priorities are unclear or hard to determine, leading to less-than-optimal cybersecurity product purchases and/or activities. This is because the metrics about which overarching cybersecurity priorities matter [...]

By |January 10th, 2017|

OpenPMF 4.0 Explainer & Demo Videos

In this video, ObjectSecurity founder & CEO Dr. Ulrich Lang explains and showcases the major new release 4.0 of our OpenPMF product.  OpenPMF™ makes security policy manageable through automation. It gives you powerful security policy implementation that is also effortless to manage. It allows you to improve protection, monitoring, testing, and documenting – for your information, [...]

By |December 14th, 2016|

IAM Meetup: Access Control in 2017 – What you need to know to stay ahead

Hello IAM Meetup members! Happy to announce another meetup on October 6, 2016, 5-7 PM at Stone Brewery at Liberty Station. The format will be a little different this time: We will have a presentation by event sponsor ObjectSecurity who will also sponsor some drinks for attendees. The presentation will be at 5:30PM, and there [...]

By |September 7th, 2016|

IAM Meetup: Best Practices for IAM Assessments, Blueprints & Roadmaps

Hello IAM Meetup members! Happy to announce another meetup on September 8, 2016, 5-7 PM at Stone Brewery at Liberty Station. The format will be a little different this time: We will have a presentation by event sponsor IDMWORKS who will also sponsor some drinks for attendees. The presentation will be at 5:30PM, and there [...]

By |September 7th, 2016|

AuthoriZation Based Access Control (ZBAC) and model-driven security

Today I would like to share my views about authoriZation Based Access Control (ZBAC) and how it relates to model-driven security (MDS) policy automation. There are numerous incarnations of the basic idea: an authorization server issues cryptographically signed tokens for other parties upon request, which are used as an access attribute source when access decisions [...]

By |August 5th, 2016|

ObjectSecurity® wins NIST SBIR Phase II Award

San Diego, CA, USA – 18 July 2016 – ObjectSecurity®, The Security Policy Automation Company™, today announced that it has won a second award phase to commercialize National Institute of Standards and Technology (NIST)’s Access Control Policy Tool (ACPT) testing technology. The Automated Access Control Policy Testing System (A-ACPTS) developed under the award will be integrated [...]

By |July 18th, 2016|

Resource-Based Access Control (ResBAC) vs. Identity-Based Access Control (IBAC)

Most technical access control policies today are specified "identity-centric", a term I use for policies that are specified with the accessor (= the requestor's identity) in mind. This is the "who?", "who is accessing?", "who can do what?" etc. in the question that the policy answers. One of the reasons for doing that is because the information [...]

By |July 11th, 2016|