Endpoint November 20, 2017 Wireless Security Lessons From the WPA2 Vulnerability 3 min read - One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
Endpoint September 20, 2017 Have We Been Wrong All Along About Good Password Practices? 3 min read - In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.
Endpoint July 17, 2017 How Virus Protection Software Has Evolved With the Threat Landscape 3 min read - Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
Data Protection May 25, 2017 Don’t Leave Home Without These Five Travel Security Tips 3 min read - Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.
Data Protection March 13, 2017 The Enterprise Mobility Conundrum: How to Control the Data? 3 min read - Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.
Identity & Access January 30, 2017 Two-Factor Authentication: A Little Goes a Long Way 3 min read - Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
Fraud Protection November 2, 2016 The Art and Science of How Spam Filters Work 4 min read - Few truly understand how spam filters work, but nearly every internet user benefits from the security they provide on a daily basis.
Banking & Finance July 20, 2016 Blockchain Primer: It’s Way More Than Just Bitcoin 3 min read - The future of blockchain goes far beyond the banking industry. In fact, this new element of security could have far-reaching consequences across sectors.