December 4, 2017 Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification 2 min read - IT decision-makers need to evolve beyond two-factor authentication and design new ways to make the user verification process intelligent and risk-aware.
November 9, 2017 Public Key Infrastructure Concerns Raise Questions Over Internet Authentication System 2 min read - According to a recent paper, threat actors are abusing the code signing process associated with public key infrastructure and evading antivirus detection.
Endpoint November 3, 2017 Preparing for the iPhone X and the Future of Facial Recognition Technology 3 min read - The Face ID component is one of the most compelling new features of the iPhone X. Is facial recognition the future of authentication for the enterprise?
October 27, 2017 Future-Proof Your Access Management With Single Sign-On: A Lesson From Luxembourg 2 min read - Security professionals need an identity and access management solution that delivers single sign-on capabilities and can adapt to business change.
Endpoint October 12, 2017 Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM 3 min read - These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
Banking & Finance September 22, 2017 Building Digital Trust, One Blockchain at a Time 2 min read - Blockchain technology enables all participants in a transaction to validate whether the assets involved have been altered or tampered with.
Endpoint September 20, 2017 Have We Been Wrong All Along About Good Password Practices? 3 min read - In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.
Government September 11, 2017 e-Signature Security Speeds Government Paperwork Along 2 min read - The U.S. Census Bureau hopes to save $1.2 million annually by implementing e-signature technology in its internal personnel evaluation system.
Identity & Access September 7, 2017 Security Specialists Discuss Identity and Access Management in the Age of Ransomware 7 min read - Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.
Risk Management September 1, 2017 Poor Management of Security Certificates and Keys Leads to Preventable Outages 2 min read - Despite significant progress in the area of security certificates, many organizations still suffer preventable outages, according to a recent study.