authentication

The Password Is Dead! Long Live the Password!

Recent news headlines have declared the password dead. But what's slated to replace it? Are all consumers comfortable with the same authentication methods? Different generations aside, one thing's certain: there's got to be a better way.

Protecting Data on IoT’s Rocky Road

Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.

Dodging SHA-1’s Collision Course

Security researchers at the CWI institute in Amsterdam working together with a team from Google found a practical way to compromise the SHA-1 hash algorithm. The goal of this post on ITSPmagazine is to explain the impact of this finding and what can be done to mitigate the risk.

CyberSecurity: How Smart Are Smart Homes? Not That Smart

After years of discussion, expectation and experimental products, it looks like the smart home is finally having its moment - particularly with popular adoption of devices like Google Home and Amazon Echo. Of course, these convenient and exciting devices are still new, and that means there are still bugs to work out. Where does this leave us?

5 Best Practices to Protect Your Small Business from Cyber Attacks

Most small businesses think that they can’t or won’t be the victims of cyber attack — that fraudsters and hackers are only interested in going after large corporations. Think again — and consider these 5 best practices when you do.

Happy Ransomware Year, MongoDB!

Malicious actors are wasting no time in kicking off 2017…in the past week we’ve seen an active and growing ransom campaign against over 10,000 unsecured Internet-facing data MongoDB instances. Here expert Jason Garbis explores this situation a bit more, and then takes a step back for some analysis.