Opinions

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Security versus usability a conundrum in modern identity management?

Convenience and usability vs. security when dealing with a valuable verified identity.

file folder storage and sharing

How cloud storage solutions are evolving to fight hackers

Decentralized cloud services are disrupting the industry, increasing security and more. Here's how these companies are looking to the future and designing a new breed of storage solutions: decentralized, blockchain-backed cloud...

login credential - user name, password - administrative controls

The great identity re-architecture: enabling trust and interoperable credentials

What happens to all of the consumer and employees accounts online that are created but seldom used? Today digital identity information is replicating faster than the plastic waste in our landfills and oceans, and the harmful side...

number 4 four with binary grunge background

4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’

The Chief Information Security Officer is the latest addition to the C-suite with funding, staff and authority to ensure the confidentiality, integrity and availability of corporate digital assets. The CISO must quickly shed the...

audit searching

Integrating information security into the technology development process

Ensuring vendors commit to a development environment for their products that represents best practices for assessing and testing security.

number 4 four film strip

4 cybersecurity developments to watch in 2018

Be ready for when the future arrives, start monitoring a pipeline of emerging technologies.

board ceo executives table

Top reasons CEOs should care about privacy

Privacy protection will undoubtedly be one of the defining issues of the internet age, and it’s important for leaders and companies to take notice and actively prevent breaches and protect their customers.

sun in clouds solar

Adapting to security’s new reality

The cloud has made its way into everyday vocabulary; even non-tech startups and consumers have an awareness of cloud computing and its impact. As it’s shifted the technology landscape, it’s also impacted the security landscape – not...

Lego wall breakthrough

Does DevSecOps eliminate the segregation of duties between security and DevOps?

Yes, some cloud-native application development tools include basic security features. No, that does not mean DevOps should “own” security.

piggy bank on top of a calculator

Making the case for security spend

How to gain management and customer support in security investments.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

facial recognition - biometric security identification - binary face

Connecting ABAC to identity governance and administration to extend access control capabilities

Enterprises need an approach to improve synergies between existing IAM technologies.

1 fake profile

Why we need to be worried about deepfake videos

The potential security threat of realistic fake videos of people doing and saying things they never did is cause for concern. Learn why and how they were developed, the risk they might represent when they spill beyond the world of...

whyhpcmatters frauddetection 1000

3 things your marketing department can teach your CNP fraud prevention team

You may be surprised to learn that your marketing department can teach your fraud prevention team a lot about card not present fraud. Not only are the two departments working in tandem to reach the same goals, but the marketing...

government cios without authority washington columns executives

How agencies learned to stop worrying and love the blockchain

A little uncertainty is a small price to pay for the promise of better security.

think ponder reflect

Cybersecurity – how confident (complacent?) are you?

Cybersecurity must be a process of continual evolution: just because you feel protected today doesn’t mean you will be tomorrow.

private public hybrid cloud technology sign

Our digital data is more valuable than our non-digital data. So why do we care less?

A framework to protect our digital data using a shared responsibility model based on data value.

orange number 5 pool ball top five 5 tips

5 simple steps for SMBs to ensure cyber resiliency

While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared.

facial recognition access identification biotech

Navigating the gap between security and accessibility

You're probably already comfortable with your fingerprint replacing your password. But are you ready for your face to replace your boarding pass, your concert ticket or your security card?

protection privacy security internet network lock

2018: The year data privacy got real

As a company executive, it is critical to understand how your business stores, shares, analyzes and protects its core private data, particularly that of customers and employees. Today, this is a monumental task – machine learning...

Load More