Monthly Archive for: ‘2 years ago’

Security Experts Jeff Schmidt and Doug Howard Discuss Mitigating Cyber Threats

Security Experts Jeff Schmidt and Doug Howard Discuss Mitigating Cyber Threats

Enterprises are more focused today than ever before on securing their networks and ensuring that sensitive information about their company …

Read More

Your customer’s data – are your partners as careful with it as you are?

Your customer’s data – are your partners as careful with it as you are?

The consensus across the security industry is that C-level executives are starting to wake up to the current cybersecurity reality. …

Read More

Hacking two-factor authentication – an old problem in need of a new solution

Hacking two-factor authentication – an old problem in need of a new solution

I recently had the opportunity to be a panelist on an Access Granted Webinar entitled, “Anatomy of a Breach,” in …

Read More

Want PII with that? A look at the retail security landscape

Want PII with that? A look at the retail security landscape

In my last post on Access Granted, I looked at the financial services industry and took a deep dive into …

Read More

The seven myths of cybersecurity: One strong password for every account

The seven myths of cybersecurity: One strong password for every account

Every day it seems that a new security breach is identified and reported in the news. With Starbucks, Target and …

Read More

Poor cyber hygiene – even the experts are susceptible

Poor cyber hygiene – even the experts are susceptible

We often talk about the need for good cyber hygiene for ensuring that credentials aren’t stolen and used for nefarious …

Read More

More money, more problems – the cybersecurity threats facing financial services companies

More money, more problems – the cybersecurity threats facing financial services companies

According to the Federal Bureau of Investigation, federally insured financial institutions were robbed approximately 3,900 times in 2014. Although that …

Read More

Anatomy of a breach –  analyzing the impacts of recent, high-profile security incidents

Anatomy of a breach – analyzing the impacts of recent, high-profile security incidents

On July 22, 2015, security experts Jeff Schmidt – the CEO of Authomate – and Doug Howard – the CEO …

Read More