All Posts Tagged Tag: ‘strong authentication’

PODCAST: Why security needs to extend across all links in your supply chain

PODCAST: Why security needs to extend across all links in your supply chain

If cybersecurity isn’t the top concern for an enterprise and its CIO in today’s heightened and increasingly sophisticated threat landscape, …

Read More

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Ease of use the key to securing cloud resources – a Q&A with Chad Moore of Xonicwave

Aside from embracing a myriad of SaaS solutions and other basic cloud services, very few enterprises have taken the leap …

Read More

Are hackers watching you sleep?

Are hackers watching you sleep?

Fitbit, a California based company that manufactures wireless enabled, wearable activity trackers, was recently hacked by cybercriminals. These malicious actors …

Read More

Ensuring collaboration and security in disaster response situations

Ensuring collaboration and security in disaster response situations

State and local governments expend significant resources planning for emergency situations and disaster response. They train their firefighters, police and …

Read More

PODCAST: The evolving security industry and the shift to risk-based security

PODCAST: The evolving security industry and the shift to risk-based security

In a recent post on Access Granted, we looked back at the major breaches that occurred in 2015 and discussed …

Read More

Theme of 2015: Compromised credentials fuel cyber attacks

Theme of 2015: Compromised credentials fuel cyber attacks

Major cyber attacks and breaches have been occurring for years, but 2015 seemed to be a particularly bad year for …

Read More

Credential sharing – security faux pas, or security best practice?

Credential sharing – security faux pas, or security best practice?

If you were to ask most security professionals how they felt about credential sharing within their enterprise, chances are that …

Read More

Keeping spirits high during holiday shopping season by protecting POS systems

Keeping spirits high during holiday shopping season by protecting POS systems

Starwood, a hotel chain that includes W Hotels, Westin, Sheraton and Le Meridien, had 54 of its locations hit by …

Read More

Comcast Breach – brand reputation killer or reputation builder?

Comcast Breach – brand reputation killer or reputation builder?

In my previous article, I discussed the Comcast breach – which involved the company resetting roughly 200,000 user accounts after customer information …

Read More

200,000 Comcast Customer Accounts Compromised and Sold Online

200,000 Comcast Customer Accounts Compromised and Sold Online

On November 9, 2015, Comcast reset roughly 200,000 user accounts after customer information and login credentials were compromised and put …

Read More

Page 1 of 512345»