Identity & Access August 23, 2016 Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene 2 min read - Rewarding users for strong password selection can be a good way to eliminate terrible password hygiene throughout an organization.
Fraud Protection August 16, 2016 Eliminate Weak Passwords With Regular Auditing 3 min read - As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.
Fraud Protection August 5, 2016 Identity Theft and Social Media: How Are They Related? 3 min read - Social media has created many new ways for people to interact. While this can be viewed as exciting, it also leaves users vulnerable to identity theft.
August 2, 2016 Typing Predictions of SwiftKey May Have Leaked Users’ Emails 2 min read - The SwiftKey mobile app's typing prediction feature has been generating unfamiliar phrases, emails and passwords belonging to other users.
Identity & Access July 27, 2016 The Rise of the Selfie Authentication as a New Security Factor 2 min read - Many online vendors are moving toward more innovative and secure methods of confirming a user's identity, including selfie authentication.
Identity & Access July 25, 2016 May the Best IAM Program Win: Four Steps to Shoot for the Gold 4 min read - A mature IAM program optimized to a business's objectives and the unique circumstances surrounding it can minimize the risk of data breaches.
July 14, 2016 Shard: Password Peace of Mind or Potential Problem? 2 min read - Shard is designed to help users track down and eliminate duplicate passwords. But what happens if cybercriminals repurpose the protective program?
Risk Management July 11, 2016 Risk-Based Security Lessons From Airport Lines 2 min read - Take some time to reflect on how airport security and initiatives from the TSA can influence risk-based security practices in the enterprise.
Identity & Access July 6, 2016 Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach 2 min read - Identity and access management solutions that incorporate risk-based controls can help organizations avoid a potentially harmful data breach.
Threat Intelligence July 5, 2016 Account Takeovers: They Can Happen to Anyone 4 min read - Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.