August 28, 2014 Backoff Hacker Tool: Secret Service Warns Target Malware Still Active 3 min read - According to a recent Secret Service and Department of Homeland Security release, the Backoff hacker tool is still alive and well in American POS systems.
August 13, 2014 Data Security Gets a Wake-Up Call From Blackphone 2 min read - Blackphone offers a robust security and privacy suite, which is handy for sophisticated users but not a complete solution for all mobile users.
August 12, 2014 Multifactor Authentication Market to Be Worth $10 Billion by 2017 — But Is the Model All Wrong? 3 min read - The global multifactor authentication market is predicted to hit $10 billion by 2017; but are current methodologies ahead of the curve or behind?
August 11, 2014 IBM Acquires Lighthouse to Help Streamline IAM for Mobile, Social and Cloud 2 min read - Streamlining Identity and Access Management (IAM) for Mobile, Social and CloudImprovements in the digital community have exacerbated the challenges of...
July 31, 2014 IBM Announces the Acquisition of CrossIdeas 5 min read - The Next Generation of Identity and Access GovernanceToday, we are pleased to announce that IBM has acquired CrossIdeas, an innovative provider of...
July 30, 2014 Ransomware and Cyber Extortion: What You Need to Know and Do 3 min read - Today, cyber criminals are applying ancient approaches to modern technologies by using ransomware and cyber extortion to demand money from victims.
July 18, 2014 Tips and Tricks for Negotiating the Wild West That Is Black Hat 3 min read - Black Hat and Defcon are notoriously lawless. If you can't be convinced to just stay home, follow these tips before heading to the conferences.