All Posts Tagged Tag: ‘multifactor authentication’

Actually, There is a Simple Solution for Password Reuse

Actually, There is a Simple Solution for Password Reuse

Earlier this month in a blog on Kaspersky Lab’s Threat Post, well-known security writer, Tom Spring, shared his thoughts on …

Read More

NIST seeks to overcome significant issues with healthcare data security and access

NIST seeks to overcome significant issues with healthcare data security and access

Think about your healthcare history. Chances are, you have multiple different doctors today. And chances are even better that you’ve …

Read More

Learning Lessons from Ukraine – Ensuring Cybersecurity for Critical Infrastructure

Learning Lessons from Ukraine – Ensuring Cybersecurity for Critical Infrastructure

Earlier this year, we interviewed Ed Cabrera, the Vice President of Cybersecurity Strategy at global security software company, Trend Micro, …

Read More

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Each quarter, the Anti-Phishing Working Group (APWG) – a coalition unifying the global response to cybercrime across industry, government, law-enforcement …

Read More

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

In addition to mostly watching networks for breaches and responding accordingly when they were identified, traditional cyber security methodology and …

Read More

Moving Beyond Multifactor Authentication to the Next Generation

Moving Beyond Multifactor Authentication to the Next Generation

Reading through the news headlines day after day, you could be forgiven for becoming immune to the stories about breaches, …

Read More

UCF breach shows that colleges and universities need to get serious about security

UCF breach shows that colleges and universities need to get serious about security

When we think about the organizations and enterprises that are prime targets for data thieves and malicious actors, the usual …

Read More

PODCAST: Why security needs to extend across all links in your supply chain

PODCAST: Why security needs to extend across all links in your supply chain

If cybersecurity isn’t the top concern for an enterprise and its CIO in today’s heightened and increasingly sophisticated threat landscape, …

Read More

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Aside from embracing a myriad of SaaS solutions and other basic cloud services, very few enterprises have taken the leap …

Read More

Are hackers watching you sleep?

Are hackers watching you sleep?

Fitbit, a California based company that manufactures wireless enabled, wearable activity trackers, was recently hacked by cybercriminals. These malicious actors …

Read More

Page 1 of 712345»...Last »