Latest posts

Stolen money and overly-caffeinated hackers – a look at the Starbucks breach

Stolen money and overly-caffeinated hackers – a look at the Starbucks breach

On July 22, 2015, Authomate CEO Jeff Schmidt and Savanture CEO Doug Howard recorded a Webinar with Access Granted’s executive …

Read More

PODCAST: Big game phishing – how to avoid being the catch of the day

PODCAST: Big game phishing – how to avoid being the catch of the day

We’ve all been the target of a phishing scam – even if it was as easy to spot and weak …

Read More

The Anthem breach, how stolen credentials led to the compromise of 80M member accounts

The Anthem breach, how stolen credentials led to the compromise of 80M member accounts

On July 22, 2015, Authomate CEO Jeff Schmidt and Savanture CEO Doug Howard recorded a Webinar with Access Granted’s executive …

Read More

Security Experts Jeff Schmidt and Doug Howard Discuss Mitigating Cyber Threats

Security Experts Jeff Schmidt and Doug Howard Discuss Mitigating Cyber Threats

Enterprises are more focused today than ever before on securing their networks and ensuring that sensitive information about their company …

Read More

Your customer’s data – are your partners as careful with it as you are?

Your customer’s data – are your partners as careful with it as you are?

The consensus across the security industry is that C-level executives are starting to wake up to the current cybersecurity reality. …

Read More

Hacking two-factor authentication – an old problem in need of a new solution

Hacking two-factor authentication – an old problem in need of a new solution

I recently had the opportunity to be a panelist on an Access Granted Webinar entitled, “Anatomy of a Breach,” in …

Read More

Want PII with that? A look at the retail security landscape

Want PII with that? A look at the retail security landscape

In my last post on Access Granted, I looked at the financial services industry and took a deep dive into …

Read More

The seven myths of cybersecurity: One strong password for every account

The seven myths of cybersecurity: One strong password for every account

Every day it seems that a new security breach is identified and reported in the news. With Starbucks, Target and …

Read More

Poor cyber hygiene – even the experts are susceptible

Poor cyber hygiene – even the experts are susceptible

We often talk about the need for good cyber hygiene for ensuring that credentials aren’t stolen and used for nefarious …

Read More

Page 7 of 14« First...«56789»10...Last »