Latest posts

The Federal Government’s Cybersecurity Marathon: Credit to Tony Scott for Highlighting Authentication as a Key Strategy

The Federal Government’s Cybersecurity Marathon: Credit to Tony Scott for Highlighting Authentication as a Key Strategy

As the full scale of the Office of Personnel Management came to light this summer, Federal CIO, Tony Scott, took …

Read More

A silver lining to the OPM breach – more federal focus on security

A silver lining to the OPM breach – more federal focus on security

The breach of the Office of Personnel Management (OPM) in June has dominated headlines this summer, and for good reason. …

Read More

Excellus BlueCross BlueShield latest health insurer to fall victim to cyberattack

Excellus BlueCross BlueShield latest health insurer to fall victim to cyberattack

On December 23 of 2013, approximately 10 million citizens of upstate New York received quite the Christmas “gift.” Unfortunately, they …

Read More

Why one breach begets more breaches – a look at the DropBox “breach”

Why one breach begets more breaches – a look at the DropBox “breach”

As was recently illustrated in the Access Granted, “Seven Myths of Cybersecurity,” infographic series, Americans have a pretty serious issue …

Read More

OPM breach catches government off guard

OPM breach catches government off guard

Your employer’s human resources department is privy to a lot of information about you. They have your social security number, …

Read More

PODCAST: Password managers…friend or foe?

PODCAST: Password managers…friend or foe?

If you ever want to conduct a rather frightening science experiment, download a password manager and ask it to pull …

Read More

JPMorgan Chase – how a $2 trillion company exposed 76 million households

JPMorgan Chase – how a $2 trillion company exposed 76 million households

When you’re looking to steal money, you don’t rob a person or store that doesn’t have any. It’s counterproductive. You …

Read More

The seven myths of cybersecurity: I’m not at risk

The seven myths of cybersecurity: I’m not at risk

Many people struggle to change their behaviors and act in ways that are safer, healthier or more beneficial for them. …

Read More

UCLA Health breach shows data thieves increasingly focused on healthcare

UCLA Health breach shows data thieves increasingly focused on healthcare

In our last post on Access Granted, we featured a Q&A interview with Matthew Webb, a Senior Consultant at Ingenuity Associates, …

Read More

Page 6 of 14« First...«45678»10...Last »