two-factor authentication

It Looks Like Your SMB Needs A New List Of Cybersecurity Resolutions

We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.

ISSA-LA Conference #9 Was So Good, We Can’t Wait For #10

The 9th annual ISSA-LA conference, the “premier cybersecurity event in Southern California,” came to a close after two successful days of opening and closing keynotes, panels, forums and training sessions. ITSPmagazine's Selena Templeton heard many great speakers, interviewed a handful of people, and networked with colleagues and conference attendees. This is her recap of the conference.

The Password Is Dead! Long Live the Password!

Recent news headlines have declared the password dead. But what's slated to replace it? Are all consumers comfortable with the same authentication methods? Different generations aside, one thing's certain: there's got to be a better way.

Think About It: Messenger's Live Location, and Other Privacy Issues on Facebook

The new Facebook Messenger "live location" feature comes in handy when coordinating plans with friends, as it lets users share their real-time location on a map within a private/group message. But what kind of security vulnerabilities are consumers voluntarily opening themselves up to?

Your Personal CyberSecurity Needs You. Learn How To Enhance Your iPhone Security

What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.

Stuck in Cybersecurity Hell? Professional Education Is the Only Way Out

If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.

CyberSecurity: How Smart Are Smart Homes? Not That Smart

After years of discussion, expectation and experimental products, it looks like the smart home is finally having its moment - particularly with popular adoption of devices like Google Home and Amazon Echo. Of course, these convenient and exciting devices are still new, and that means there are still bugs to work out. Where does this leave us?

5 Best Practices to Protect Your Small Business from Cyber Attacks

Most small businesses think that they can’t or won’t be the victims of cyber attack — that fraudsters and hackers are only interested in going after large corporations. Think again — and consider these 5 best practices when you do.

Double Yahoo Breach: Nothing You Can Do About It, But Learn

It's time to stop pretending this is not going to happen to you. At work, or in your everyday life, we need to learn how to live with cybersecurity. If we want to play in an IoT and Internet-connected world, we need to learn how to play by the rules. Nobody has taught you thus far. It's time to get started. Now.

Spooks, Spies, And The Loss Of Humanity

Jamison Utter explores the relationship between business values and cybersecurity; a look at the impact of business models being too concerned with bottom lines, stock prices, and shareholder expectations.

Who Are You to Ask Me Who I Am? Two Party Authentication is a Must

Ever get that feeling where the person on the other end of the incoming phone isn't who they claim to be? What about that time you needed to contact your bank so you click the link in the email to find the bank's number - ever wonder if it's a legitimate number? Maybe you should think twice. Twice authenticated, that is.

2 Factors Might Be Better Than 1, But Is It Enough?

‘Compliance does not equal security’ was the mantra of this session called Two-Factor Isn’t Enough – We Show You Why. Ryan Rowcliffe of SecureAuth reminded us that merely having a two-factor authentication technology in place isn’t nearly safe enough because when it comes to convenience, people will almost always eschew security measures.

The Anatomy of a Banker Malware - Unraveling Marcher

Mobile malware has already compromised sensitive military and business related information. Enterprises should take this threat seriously and close any gaps in mobile security to avoid breaches of sensitive information.

Expert Oren Koriat walks us through the Marcher banking malware.

Your Credentials Are Compromised, Now What?

Your Credentials Are Compromised, Now What?

If you’re not using an identity management or password management service, this can be cumbersome and inefficient for your end users and expose your organization to unnecessary risks.


Expert Lee Godby talks us through the highlights of multi-factor authentication which can be used to help protect a breach by protecting against the re-use of lost or stolen credentials.