_Experts-Consumers

Innovation Leads to a New Frontier of Identity Management

With the exposure of personally identifiable information via data breaches, organizations need to look beyond name, address, date of birth and Social Security Number to accurately identify individuals. Advanced data and innovative technology, such as physical and behavioral biometrics, device intelligence and digital behaviors, can help usher in a new frontier of authentication and lead to improved identity proofing as well as a better customer experience.

Marketing Is Overpromising And Under-Delivering Cybersecurity

The fear-mongering of cybersecurity is ruining the industry, as emotions are being targeted rather rationality. Fear sells, after all. Nathan Burke of Axonius discusses the current state of the InfoSec industry and what the way forward is from here.

What If We Are Protecting The Wrong Things?

Too often, companies' security strategies revolve around minimizing reputational damage and achieving compliance. Javvad Malik, an award-winning information security consultant and security advocate at AlienVault, suggests that businesses need to take a more granular approach to focus on protecting employee and customer data instead.

How Secure Is Your Social Login?

To address the rising tide of data breaches, social network providers have enhanced their built-in security and have focused primarily on improving multi-factor authentication processes. To better understand what varying platforms offer, Ehud Amiri, senior director for product management at OneLogin, looks at how the leading social media sites are protecting their users.

California’s ‘SB-327 Information Privacy: Connected Devices’ Bill Could Be The First To Establish IoT Regulation

If signed by Governor Brown on September 30th, California’s "SB-327 Information privacy: connected devices” bill – the first to establish regulation around IoT – will require connected devices sold or offered for sale in California to have “reasonable security features appropriate to the nature of the device”. Although the bill is a good start, Aaron Guzman, Head of Automotive & IoT at Aon, outlines what an even better approach might be.

Legalized Sports Betting, Player Experience And Fraud Prevention

As new players are welcomed into the sports betting ring with the recent law changes, fraudsters will attempt to take advantage. New entrants to the online sports betting world in the U.S. must come to terms with a core challenge facing nearly every digital business: how to ensure an exceptional user experience while also preventing fraudulent activity.

Every Parent's Nightmare: Your Child Is Being Cyberbullied

It is every parent’s nightmare: their child is being bullied. Except it’s even more insidious if the bullying is happening online where it’s hard to see and even harder to stop. How can you prevent, spot and address cyberbullying, how can you get your child to talk about what might be happening to them, and how can you help them overcome it? Here are a few tips to get you started.

What Your ISP Knows About You

We’ve all heard the stories about ISP employees monitoring user traffic for the sake of private gain or when dying of boredom, but are those legends true? David Balaban, a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation, shows us what your Internet service provider (ISP) really knows about you.

If You Thought 2017 Was Tough, Say Hello To 2018

2017 brought some of the most damaging cyber-attacks and volume driven data breaches the world has ever seen. Detailed profiles have been built on nearly every individual in the United States posing a threat to each consumer and organization. A wave of cyber crime is coming our way in 2018 like never seen before. How will you respond?

Seriously?! Can You Not Do That? Chapter IV - Insecure Use of Public Wi-Fi

At one time or another, we’ve all connected to the Internet via public Wi-Fi – at a coffee shop, in a hotel, on a plane. The convenience is irresistible, but few people are aware that public Wi-Fi is one of the biggest risks to personal and business security because these networks are so easy to attack for hackers. Cybersecurity experts answer these questions: Are any public WiFi networks safe? What harm can be done on these public networks? And how can you protect yourself against this risk?

Looking for a new job? Then the scammers want you!

If you're a big company and you're not looking for imposters, you're making a big mistake. If you, as an individual, get a job offer emailed to you out of the blue apparently from a big company, it's pretty much a certainty you're going to loose out big time if you get "employed." Read Mark Gibbs' latest Gearhead column to learn why.

How To Stay Cybersecure This Summer Vacation

Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun.

The Internet of Toys. Is Barbie Spying on You?

I just received a review sample of a toy that is—and this is not a word I use lightly—awesome. It's the Cozmo, a small robot that is just amazing. Isn't that adorable? But, what's the catch?

Educating for a Responsible and Innovative Digital Future

Hak4Kidz: starting in America’s heartland, planting seeds for a responsible and innovative digital future. Roaming illustrator for ITSPmagazine, Lisa Chu, explores the world of cyber education across America.

Serena L-G., 12 and a Half Years Old, Says "Sec_rity is not complete without you"

As part of a community service project for school, when asked to write an article to describe a teen's view of cybersecurity, Serena L-G. produced this fantastic article that every parent should read.

Your Personal CyberSecurity Needs You. Learn How To Enhance Your iPhone Security

What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.

Cybersecurity - Five Tips to Avoid Being "Harpooned” This Tax Season

Hackers are increasingly using social engineering scams to impersonate top executives and request transfers of funds or confidential employee information such as W-2 tax form information. Katherine Keefe, global head of BBR Services, offers 5 tips to help avoid being harpooned this tax season.

Dear Santa, Please Keep My Customer Data Safe This Year

With hacking rampant, and the holiday shopping season upon us, no company wants to become the next headline. Lucas Long from InfoTrust shares 3 ways to keep customer data safe.