All Posts Tagged Tag: ‘MFA’

Actually, There is a Simple Solution for Password Reuse

Actually, There is a Simple Solution for Password Reuse

Earlier this month in a blog on Kaspersky Lab’s Threat Post, well-known security writer, Tom Spring, shared his thoughts on …

Read More

NIST seeks to overcome significant issues with healthcare data security and access

NIST seeks to overcome significant issues with healthcare data security and access

Think about your healthcare history. Chances are, you have multiple different doctors today. And chances are even better that you’ve …

Read More

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Each quarter, the Anti-Phishing Working Group (APWG) – a coalition unifying the global response to cybercrime across industry, government, law-enforcement …

Read More

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

In addition to mostly watching networks for breaches and responding accordingly when they were identified, traditional cyber security methodology and …

Read More

UCF breach shows that colleges and universities need to get serious about security

UCF breach shows that colleges and universities need to get serious about security

When we think about the organizations and enterprises that are prime targets for data thieves and malicious actors, the usual …

Read More

PODCAST: Why security needs to extend across all links in your supply chain

PODCAST: Why security needs to extend across all links in your supply chain

If cybersecurity isn’t the top concern for an enterprise and its CIO in today’s heightened and increasingly sophisticated threat landscape, …

Read More

Ensuring collaboration and security in disaster response situations

Ensuring collaboration and security in disaster response situations

State and local governments expend significant resources planning for emergency situations and disaster response. They train their firefighters, police and …

Read More

PODCAST: The evolving security industry and the shift to risk-based security

PODCAST: The evolving security industry and the shift to risk-based security

In a recent post on Access Granted, we looked back at the major breaches that occurred in 2015 and discussed …

Read More

Theme of 2015: Compromised credentials fuel cyber attacks

Theme of 2015: Compromised credentials fuel cyber attacks

Major cyber attacks and breaches have been occurring for years, but 2015 seemed to be a particularly bad year for …

Read More

Credential sharing – security faux pas, or security best practice?

Credential sharing – security faux pas, or security best practice?

If you were to ask most security professionals how they felt about credential sharing within their enterprise, chances are that …

Read More

Page 1 of 212»