Latest posts

Theme of 2015: Compromised credentials fuel cyber attacks

Theme of 2015: Compromised credentials fuel cyber attacks

Major cyber attacks and breaches have been occurring for years, but 2015 seemed to be a particularly bad year for …

Read More

All I want for Christmas is my identity back!

All I want for Christmas is my identity back!

If you were a cyber criminal, the most valuable identity you could possibly steal would be one that you could …

Read More

Credential sharing – security faux pas, or security best practice?

Credential sharing – security faux pas, or security best practice?

If you were to ask most security professionals how they felt about credential sharing within their enterprise, chances are that …

Read More

Keeping spirits high during holiday shopping season by protecting POS systems

Keeping spirits high during holiday shopping season by protecting POS systems

Starwood, a hotel chain that includes W Hotels, Westin, Sheraton and Le Meridien, had 54 of its locations hit by …

Read More

Mobile Shopping Goes Mainstream, But Where’s the Security?

Mobile Shopping Goes Mainstream, But Where’s the Security?

The holiday shopping season kicked off with a bang on Thanksgiving weekend as usual, but this year the way in …

Read More

Comcast Breach – brand reputation killer or reputation builder?

Comcast Breach – brand reputation killer or reputation builder?

In my previous article, I discussed the Comcast breach – which involved the company resetting roughly 200,000 user accounts after customer information …

Read More

200,000 Comcast Customer Accounts Compromised and Sold Online

200,000 Comcast Customer Accounts Compromised and Sold Online

On November 9, 2015, Comcast reset roughly 200,000 user accounts after customer information and login credentials were compromised and put …

Read More

The Seven Myths of Cybersecurity: You don’t have to be a Detective to Spot a Phishing Attack

The Seven Myths of Cybersecurity: You don’t have to be a Detective to Spot a Phishing Attack

Despite the nearly constant stream of new cyber breaches and security threats in the news, many people continue to eschew …

Read More

Hacking as a Business Model

Hacking as a Business Model

This week’s news that three men had been charged in the largest ever data breach of a financial institution has …

Read More

Problems with Apple Touch ID illustrate larger challenges of biometrics

Problems with Apple Touch ID illustrate larger challenges of biometrics

In previous posts on Access Granted, I’ve looked at utilizing biometrics – the innate, distinctive characteristics of a person – …

Read More

Page 4 of 14« First...«23456»10...Last »