Passwords are a problem, and relying on them for user authentication is problematic. This has been an accepted truth in the infosec community for some time, yet credential-based methods are still ubiquitous. The average person now has dozens of personal and business username/password combinations to keep track of and recycles…
Read More
Despite the $124 billion that Gartner estimated organizations would spend fending off cyberthreats this year, the frequency and severity of incidents continues to grow. A report by Nominet found that the majority of chief information security officers (CISOs) lack the necessary resources to defend their organizations. And an informal survey…
Read More
Unless your current threat management program is fully capable of securing internet of things (IoT) devices, you could likely benefit from attending an IoT security summit to learn what other industry leaders are doing to discover, analyze and protect unmanaged devices. As a chief information security officer (CISO) or other…
Read More
It’s always exciting to announce the results of our annual Cost of a Data Breach Report, and this year, the 14th report conducted by the Ponemon Institute, the 2019 Cost of a Data Breach Report offers new and innovative ways to analyze the financial impacts, root causes and mitigating factors…
Read More