Monthly Archive for: ‘2 years ago’

The Cybersecurity Information Sharing Act: What’s Needed is Education Not Legislation

The Cybersecurity Information Sharing Act: What’s Needed is Education Not Legislation

Many years ago, Will Rogers, noted Oklahoman and media start of the 1920s and 1930s, quipped “you can’t legislate intelligence …

Read More

Password Security is Hitting the Headlines

Password Security is Hitting the Headlines

After years of languishing at the bottom of everyone’s priority list, password security has finally become a ‘hot topic’ and …

Read More

Secure Authentication Protocols Move to Center Stage; Still More Work to be Done

Secure Authentication Protocols Move to Center Stage; Still More Work to be Done

After years being on the margins of data security, authentication appears to be finally getting the attention it deserves.  Once …

Read More

Barclays banks on biometrics…but should it?

Barclays banks on biometrics…but should it?

According to Verizon’s 2015 Data Breach Investigations Report (DBIR), the retail and financial services industries are the two markets most …

Read More

Two Factor Tuesday: The Beginning of an Important Conversation About Online Security

Two Factor Tuesday: The Beginning of an Important Conversation About Online Security

Last Tuesday, October 6th, 2015 was designated as Two Factor Tuesday by the National Cyber Security Alliance.  When compared to …

Read More

Key Resources for Developing a Strategic Cyber Security Plan for American Businesses

Key Resources for Developing a Strategic Cyber Security Plan for American Businesses

For as long as we’ve had a commercially-focused Internet we’ve had cyber security threats. And, for as long has we’ve …

Read More

Experian breach puts T-Mobile customers in the crosshairs

Experian breach puts T-Mobile customers in the crosshairs

In a previous article on Access Granted, I looked at a recent breach that impacted PNI Digital Media, a company …

Read More

Post Mortem on Data Breach Underscores Importance of Password Security

Post Mortem on Data Breach Underscores Importance of Password Security

When a data breach is reported in the media the focus is on where the attack originated from and the …

Read More