Authentication

Actually, There is a Simple Solution for Password Reuse

Actually, There is a Simple Solution for Password Reuse

Earlier this month in a blog on Kaspersky Lab’s Threat Post, well-known security writer, Tom Spring, shared his thoughts on …

Read More

Walking out the door with sensitive data – a look at the FDIC breach

Walking out the door with sensitive data – a look at the FDIC breach

Federal agencies have a steep hill to climb when it comes to protecting their networks. They have a very diverse …

Read More

NIST seeks to overcome significant issues with healthcare data security and access

NIST seeks to overcome significant issues with healthcare data security and access

Think about your healthcare history. Chances are, you have multiple different doctors today. And chances are even better that you’ve …

Read More

Learning Lessons from Ukraine – Ensuring Cybersecurity for Critical Infrastructure

Learning Lessons from Ukraine – Ensuring Cybersecurity for Critical Infrastructure

Earlier this year, we interviewed Ed Cabrera, the Vice President of Cybersecurity Strategy at global security software company, Trend Micro, …

Read More

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Each quarter, the Anti-Phishing Working Group (APWG) – a coalition unifying the global response to cybercrime across industry, government, law-enforcement …

Read More

How a stolen laptop can cost healthcare companies $3.9M

How a stolen laptop can cost healthcare companies $3.9M

Here’s a scenario for you – an employee takes one of your company laptops from the office. They put it …

Read More

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Aside from embracing a myriad of SaaS solutions and other basic cloud services, very few enterprises have taken the leap …

Read More

Are hackers watching you sleep?

Are hackers watching you sleep?

Fitbit, a California based company that manufactures wireless enabled, wearable activity trackers, was recently hacked by cybercriminals. These malicious actors …

Read More

Ensuring collaboration and security in disaster response situations

Ensuring collaboration and security in disaster response situations

State and local governments expend significant resources planning for emergency situations and disaster response. They train their firefighters, police and …

Read More

All I want for Christmas is my identity back!

All I want for Christmas is my identity back!

If you were a cyber criminal, the most valuable identity you could possibly steal would be one that you could …

Read More

Page 2 of 5«12345»