Latest posts

Point of Sales Systems Continue to Leave Restaurants – and Diners – Open to Data Breaches

Point of Sales Systems Continue to Leave Restaurants – and Diners – Open to Data Breaches

The hamburger you bought at Wendy’s  last month may be costing you a lot more than $4.99. The fast food …

Read More

PODCAST: Why security needs to extend across all links in your supply chain

PODCAST: Why security needs to extend across all links in your supply chain

If cybersecurity isn’t the top concern for an enterprise and its CIO in today’s heightened and increasingly sophisticated threat landscape, …

Read More

Worst Passwords List Shows No Improvement over Previous Years

Worst Passwords List Shows No Improvement over Previous Years

Recently, the Worst Passwords list for 2015 was released, once again revealing that the most commonly used passwords are “12345” …

Read More

Critical Infrastructure the target of increasingly sophisticated malicious actors

Critical Infrastructure the target of increasingly sophisticated malicious actors

Just prior to the holiday season – in late December – the Wall Street Journal reported on a previously-undisclosed cyber …

Read More

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Aside from embracing a myriad of SaaS solutions and other basic cloud services, very few enterprises have taken the leap …

Read More

The Weekly Data Breach Report

The Weekly Data Breach Report

We know that not a day passes without a major data breach or information security incident in the American economy.  …

Read More

Are hackers watching you sleep?

Are hackers watching you sleep?

Fitbit, a California based company that manufactures wireless enabled, wearable activity trackers, was recently hacked by cybercriminals. These malicious actors …

Read More

Ensuring collaboration and security in disaster response situations

Ensuring collaboration and security in disaster response situations

State and local governments expend significant resources planning for emergency situations and disaster response. They train their firefighters, police and …

Read More

PODCAST: The evolving security industry and the shift to risk-based security

PODCAST: The evolving security industry and the shift to risk-based security

In a recent post on Access Granted, we looked back at the major breaches that occurred in 2015 and discussed …

Read More

C’mon folks! Let’s learn from 2015

C’mon folks! Let’s learn from 2015

This holiday season was, once again rife with hacks.  Before the first bottle of Christmas cheer was even opened, two …

Read More

Page 3 of 14«12345»10...Last »