In this session, we will discuss opportunities for advancing digital fraud protection while improving the customer experience through implementation of new digital trust strategies. Additionally, we will explore the critical role of global intelligence sharing and collaboration in the mission to establish secure...
The latest edition of the ISMG Security Report features an update on a congressional report that slams Equifax for lacking a strong cybersecurity culture. Also featured: A new study on the status of women in the cybersecurity industry and the use of Android phones as security keys.
Google's latest security feature enables the use of Android phones as a security key, eliminating the need for a separate token or hardware device. The free feature is potentially more appealing that Google's Titan security keys, which cost $50.
What approaches are healthcare entities taking with their credentialing and IAM to better verify and manage the identities of patients, clinicians, researchers, vendors and others who want or need access to health and other critical data? Our panelists Cris Ewell, CISO at UW Medicine and Jigar Kadakia, CISO and chief...
How well can banking institutions apply the right amount of security to the right transactions at the right time? Tim Bedard of OneSpan answers this question in his analysis of ISMG's new State of Adaptive Authentication in Banking survey.
The computer systems the U.S. Department of the Treasury uses to track the nation's debt have serious security flaws that could allow unauthorized access to a wealth of federal data, according to a pair of audits released this week by the Government Accountability Office.
Passwords are still a persistent security threat, given their ubiquity as a form of authentication and the inability of users to create strong, unique passwords. John Bennet of LogMeIn discusses the issue and solutions.
The Q4 2018 Notifiable Data Breaches (NDB) report documents
262 data breaches in organisations across Australia. For those in the
financial services sector it paints an alarming picture: The number
of breaches is steadily growing - and compromised credentials
are the leading cause.
According to the LastPass...
Federal regulators and medical device maker Medtronic have issued new warnings about cybersecurity vulnerabilities in certain cardiac devices from the manufacturer that could potentially allow attackers to manipulate the products' functionality, posing safety risks to patients.
Overall, Password Strength Scores follow the trends for Security
Scores: As companies get bigger, on average their Password
Strength Score goes down.
For businesses with fewer than 25 employees, the average total
Password Strength Score is 53. At more than 10,000 employees,
the average score drops to...
Multifactor authentication remains an industry best practice
for preventing unauthorized account access. Our analysis this
year found that, overall, 45% of businesses are using multifactor
authentication. This is a significant increase from last year's
24.5%. Encouragingly, more businesses are augmenting
Forget inside/outside the perimeter when mitigating
risks. That's the notion behind "zero trust," which means
applying risk-based controls to safeguard access.
Download this whitepaper to learn more about:
Cloud service attack trends;
Best practices for mitigating risks;
How to make the concept of "zero trust"...
The cyber security landscape been marred with big name and large-scale breaches: Cash Converters, Australian Defence, and Facebook, to name a few. Naturally, we expected to see an improvement in password behavior in the two years.
However, LogMeIn's new research revealed just the opposite. Password behaviors remain...