Author Archive for: ‘jeffschmidt’

Moving Beyond Multifactor Authentication to the Next Generation

Moving Beyond Multifactor Authentication to the Next Generation

Reading through the news headlines day after day, you could be forgiven for becoming immune to the stories about breaches, …

Read More

C’mon folks! Let’s learn from 2015

C’mon folks! Let’s learn from 2015

This holiday season was, once again rife with hacks.  Before the first bottle of Christmas cheer was even opened, two …

Read More

Mobile Shopping Goes Mainstream, But Where’s the Security?

Mobile Shopping Goes Mainstream, But Where’s the Security?

The holiday shopping season kicked off with a bang on Thanksgiving weekend as usual, but this year the way in …

Read More

The Cybersecurity Information Sharing Act: What’s Needed is Education Not Legislation

The Cybersecurity Information Sharing Act: What’s Needed is Education Not Legislation

Many years ago, Will Rogers, noted Oklahoman and media start of the 1920s and 1930s, quipped “you can’t legislate intelligence …

Read More

Secure Authentication Protocols Move to Center Stage; Still More Work to be Done

Secure Authentication Protocols Move to Center Stage; Still More Work to be Done

After years being on the margins of data security, authentication appears to be finally getting the attention it deserves.  Once …

Read More

Two Factor Tuesday: The Beginning of an Important Conversation About Online Security

Two Factor Tuesday: The Beginning of an Important Conversation About Online Security

Last Tuesday, October 6th, 2015 was designated as Two Factor Tuesday by the National Cyber Security Alliance.  When compared to …

Read More

Post Mortem on Data Breach Underscores Importance of Password Security

Post Mortem on Data Breach Underscores Importance of Password Security

When a data breach is reported in the media the focus is on where the attack originated from and the …

Read More

Hacking two-factor authentication – an old problem in need of a new solution

Hacking two-factor authentication – an old problem in need of a new solution

I recently had the opportunity to be a panelist on an Access Granted Webinar entitled, “Anatomy of a Breach,” in …

Read More

Strong security not enough to battle insider threat

Strong security not enough to battle insider threat

There’s nothing like a good heist or spy flick to get the heart pumping. And many times, that’s the scenario …

Read More

What sets a security solution apart in 2015…and beyond

What sets a security solution apart in 2015…and beyond

When you purchase a home, every entrance to the house comes with a lock. The first thing almost every new …

Read More

Page 1 of 212»