Lamont Wood

Contributing Writer

Lamont Wood is a freelance writer in San Antonio.

How it works: Iris scanning improves smartphone security

Power analysis may help secure devices on the Internet of Things

Power analysis may help secure devices on the Internet of Things

Previously seen as a way to crack system security, power analysis has been enlisted as a new form of protection for information technology.

Printer security: Is your company's data really safe?

Printer security: Is your company's data really safe?

IT managers have found that printers can pose major cybersecurity risks --assuming they pay any attention to them at all.

Multi-factor authentication goes mainstream

Multi-factor authentication goes mainstream

Online services have found that users are willing to turn their smartphones into combination security tokens and biometric scanners. The long-term impact on security isn’t clear yet.

Multi-factor authentication goes mainstream

Multi-factor authentication goes mainstream

Online services have found that users are willing to turn their smartphones into combination security tokens and biometric scanners. The long-term impact on security isn’t clear yet.

Mobile security: A mother lode of new tools

You may know your smartphone, but pretty soon the question will be: How well does your smartphone know you?

Malware: War without end

Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on. Today, around 5% of the average IT budget is devoted to security, estimates John Pescatore,...

Got Cyber Insurance?

Heartland Payment Systems figured it was in pretty good shape when it took out a $30 million cyber insurance policy. Unfortunately, the credit card transaction processor was the victim of a massive data breach in early 2009 that...

The clock is ticking for encryption

In the indictment that led to the expulsion of 10 Russian spies from the U.S. last summer, the FBI said that it had gained access to their encrypted communications after surreptitiously entering one of the spies' homes, where agents...

What, When and How to Respond to a Data Breach

There’s been a data breach. It happened 268 times during 2006. Now, it’s happened to your organization. What do you do?

Load More