As banks innovate to meet the changing demands of connected consumers, they are also increasing their attack surface, potentially making highly sought-after user data more accessible to cybercriminals. To mitigate these threats, financial services firms have to be aware of the risks that come with new capabilities and adjust their security architecture accordingly.
We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.
Identity theft is on the rise and the latest data breach from Equifax could bring an “avalanche” of cyber crime with losses of billions of dollars. These are times when the individual response of each one of us could urge our government to stop the growing crisis, and to change flawed credit application processes that lie at the core of it. The five steps described in this article are useful to those affected and whose privacy might be breached. A personal story highlights that identity theft is more common than people expect.
In today's breach-a-day environment, should companies issue penalties to insecure employees? Preempt’s Heather Howland thinks so. But just how severe should these penalties be? Let's find out.
The 9th annual ISSA-LA conference, the “premier cybersecurity event in Southern California,” came to a close after two successful days of opening and closing keynotes, panels, forums and training sessions. ITSPmagazine's Selena Templeton heard many great speakers, interviewed a handful of people, and networked with colleagues and conference attendees. This is her recap of the conference.
Recent news headlines have declared the password dead. But what's slated to replace it? Are all consumers comfortable with the same authentication methods? Different generations aside, one thing's certain: there's got to be a better way.
Familiar with the ‘General Data Protection Regulation' (GDPR) but not exactly sure what it entails? This piece explains that the GDPR is a regulation by which the European Parliament, the European Council and the European Commission intend to strengthen and unify data protection for individuals within the European Union (EU).
After years of discussion, expectation and experimental products, it looks like the smart home is finally having its moment - particularly with popular adoption of devices like Google Home and Amazon Echo. Of course, these convenient and exciting devices are still new, and that means there are still bugs to work out. Where does this leave us?
Do you have what it takes to win the war on cybercrime? In this Experts Corner, Ajit Sancheti outlines three moves enterprise organizations can take to position themselves for the worst. It's your move.
Even with a plethora of tools available, far too often, password security is overlooked. In this Experts Corner, expert Aaron Walker looks at research from G2 Crowd as he highlights 8 tools to help companies better manage passwords.
If you’re not using an identity management or password management service, this can be cumbersome and inefficient for your end users and expose your organization to unnecessary risks.
Expert Lee Godby talks us through the highlights of multi-factor authentication which can be used to help protect a breach by protecting against the re-use of lost or stolen credentials.