Risk Management September 1, 2017 Poor Management of Security Certificates and Keys Leads to Preventable Outages 2 min read - Despite significant progress in the area of security certificates, many organizations still suffer preventable outages, according to a recent study.
August 24, 2017 Cybercriminals Could Easily Take Over Industrial Cobots, Researchers Warn 2 min read - Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
Identity & Access August 9, 2017 The Untapped Potential of Two-Factor Authentication 3 min read - Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.
Fraud Protection August 7, 2017 Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns 4 min read - As banking and retail institutions adopt stronger security measures, cybercrime trends are shifting to maximize fraudsters' ROI.
Identity & Access August 3, 2017 IBM Scores a Strong Performer Placement in Risk-Based Authentication Wave 2 min read - IBM was recognized as a Strong Performer in "The Forrester Wave: Risk Based Authentication, Q3 2017," earning the highest possible score in two categories.
Fraud Protection July 25, 2017 The Evolution of Digital Certificates 3 min read - Digital certificates are used to authenticate both sides of a browser connection. It's a good first step, but certificates do not assure absolute trust.
June 26, 2017 Forgot Password? Man-in-the-Middle Attack Can Perform a Password Reset, Researchers Warn 2 min read - Many high-profile online services are vulnerable to a new type of attack that could enable fraudsters to intercept password reset requests.
June 22, 2017 Website Security ‘Honor Roll’ Shows Firms Still Need to Work on Data Protection 2 min read - The OTA "Online Trust Audit and Honor Roll" graded more than 1,000 consumer-facing firms on website security and found that many are simply failing.
Identity & Access June 7, 2017 The New NIST Digital Identity Guidelines and What They Mean to You 2 min read - With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
Endpoint June 5, 2017 Four Key Considerations for Managing Your IoT Population 3 min read - To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.