Latest posts

More money, more problems – the cybersecurity threats facing financial services companies

More money, more problems – the cybersecurity threats facing financial services companies

According to the Federal Bureau of Investigation, federally insured financial institutions were robbed approximately 3,900 times in 2014. Although that …

Read More

Anatomy of a breach –  analyzing the impacts of recent, high-profile security incidents

Anatomy of a breach – analyzing the impacts of recent, high-profile security incidents

On July 22, 2015, security experts Jeff Schmidt – the CEO of Authomate – and Doug Howard – the CEO …

Read More

Mitigating the risk from compromised federal credentials – a Q&A with Tripwire’s Ken Westin

Mitigating the risk from compromised federal credentials – a Q&A with Tripwire’s Ken Westin

The federal government is still reeling from a recently-exposed cyber attack that compromised the personal data of as many as …

Read More

Broken “keychain” shows futility of single-factor authentication

Broken “keychain” shows futility of single-factor authentication

Security professionals understand that some of the largest challenges they face every day are human nature and the behaviors of …

Read More

PODCAST: Are biometrics the best security?

PODCAST: Are biometrics the best security?

With the inclusion of the thumbprint scanner on iPhones, it’s safe to assume that practically every American has had some …

Read More

OPM breach clearly illustrates need for better identity and access management

OPM breach clearly illustrates need for better identity and access management

U.S. government employees got some very bad news in early June when it was announced that the Office of Personnel …

Read More

The Evolution of Cyber Threats and Multi-Factor Authentication: A Conversation with Jim Tiller

The Evolution of Cyber Threats and Multi-Factor Authentication: A Conversation with Jim Tiller

The recent breach of the Office of Personnel Management (OPM), which compromised the personal information of an estimated four million …

Read More

Starbucks breach shows that all accounts can be targets

Starbucks breach shows that all accounts can be targets

If you’re useless in the morning without your venti, soy, caramel macchiato with no whip, we may have some bad …

Read More

The perils of free security software

The perils of free security software

We’ve all seen offers in pop-up ads, app stores and download sites for free security software and solutions. And – …

Read More

The seven myths of cybersecurity: Strong passwords = strong security

The seven myths of cybersecurity: Strong passwords = strong security

Most enterprises know that they need strong cybersecurity to protect their intellectual property and other valuable information – such as …

Read More

Page 8 of 14« First...«678910»...Last »