How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.
With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.
Recent news headlines have declared the password dead. But what's slated to replace it? Are all consumers comfortable with the same authentication methods? Different generations aside, one thing's certain: there's got to be a better way.
With numerous breaches and a record number of compromised records; 2016 was the year of the mega breach. Expert Tin Zaw explores credential stuffing attacks that follow these mega breaches -- and the impact they have on society.
Since 76% of data breaches are from stolen login information. Jack Bicer, CEO of Sekur Me, says that eliminating passwords and using instant, automatic 2-factor authentication will eliminate fraudulent activities.