State-of-the-art multifactor authentication (MFA) technologies
Multifactor authentication offers more, better factors/options to protect credentials and data than ever.
David Geer | 27 Apr | Read more
Multifactor authentication offers more, better factors/options to protect credentials and data than ever.
David Geer | 27 Apr | Read more
CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.
David Geer | 24 Apr | Read more
How to protect more critical organizations from evolving ransomware.
David Geer | 07 Mar | Read more
According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks.
David Geer | 02 Mar | Read more
SWIFT is using a multipronged approach to address interbank messaging fraud.
David Geer | 06 Jan | Read more
Due to antiquated security mandates, banks participating in the SWIFT messaging system are vulnerable.
David Geer | 17 Nov | Read more
Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.
David Geer | 27 Sep | Read more
Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the kinds of change challenge change management and ultimately security.
David Geer | 12 Sep | Read more
CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze doesn’t lead to malware playtime inside your organization.
David Geer | 31 Aug | Read more
The nature of DevOps development approaches eases, invites, cries out for secure coding practices.
David Geer | 29 Jul | Read more
Midsized companies with revenues from $100 million to $1 billion spent an average of $3 million on information security as of 2014 per "The Global State of Information Security Survey 2015" from PwC.
David Geer | 18 Aug | Read more
Patrick Heim is the (relatively) new head of Trust & Security at Dropbox. Formerly Chief Trust Officer at Salesforce, he has served as CISO at Kaiser Permanente and McKesson Corporation. Heim has worked more than 20 years in the information security field. Heim discusses security and privacy in the arena of consumerized cloud-based tools like those that employees select for business use.
David Geer | 07 Aug | Read more
If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the rest of us, here's your shot at redemption via some solid preventive pen testing advice from a genuine pro.
David Geer | 07 Jul | Read more
The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.
David Geer | 20 Jun | Read more
Hit too many times with successful attacks and compromises, an enterprise's human resources can develop a victim mentality, a.k.a. learned helplessness. When this happens, employees who feel they are helpless to do anything effective to fight cyber attacks lose hope.
David Geer | 28 May | Read more