Endpoint November 17, 2015 Digital Trust in an Analog World: Can Risk-Based Access Reduce the Barriers to Mobile Working? 3 min read - Risk-based access, which combines pre-existing knowledge of users and devices with the proper context, may be a viable security solution.
October 23, 2015 How the Kiss O’Death Packet and Other NTP Vulnerabilities Could Turn Back the Internet’s Clocks 2 min read - Vulnerabilities in the Internet's Network Time Protocol could lead to cybercriminals successfully executing attacks on unsuspecting organizations.
Endpoint October 23, 2015 Mobile Security: The Casino Bouncer Who Sniffs the Mobile IDs 3 min read - Are you attending Insight 2015 because you are worried about your highly fragmented IT security posture? Mobile security could be causing this concern.
Identity & Access October 19, 2015 Your Evolving Digital Life: The Need for More Secure Authentication 2 min read - Biometrics and more secure types of authentication may be the next stage of digital security, designed to keep up with rapidly advancing technologies.
Identity & Access October 13, 2015 Who’s Watching the Front Door? 3 min read - A strong, centralized, intelligent access management solution can help slam the front door on attackers before they creep into enterprise networks.
Identity & Access October 5, 2015 A Progress Report on FIDO Authentication 2 min read - The Fast Identity Online (FIDO) Alliance is dedicated to improving authentication standards across industries and applications.
Fraud Protection September 24, 2015 Authentication: The Enterprise’s Weakest Link 3 min read - Many organizations struggle to find the right authentication methods for their employees and needs, but they can ill afford to let malpractice continue.
Endpoint September 10, 2015 Six-Digit Passcodes: Two Small Steps for Smartphones, One Giant Leap for Mobile Security 3 min read - Apple now requires six-digit passcodes (instead of four) on its devices — meaning two small steps for users, but one giant leap for mobile security.
Identity & Access August 27, 2015 Can Selfies Be the Next Multifactor Authentication Method? 2 min read - Several companies are implementing new forms of multifactor authentication to prevent fraud, but how realistic and effective are these technologies?
August 18, 2015 Insecure Configuration of MongoDB, Other Databases Could Be Leaking Information 2 min read - A recent report suggested poor configurations of MongoDB, Redis and similar database products may be exposing data to cybercriminals.