When framed as an innovative, even "cool" feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience.
Standards, baselines and naming conventions can remove barriers to threat detection and response and help security teams build effective SIEM use cases.
Given the historic data breaches, widespread vulnerabilities and onslaught of data privacy regulations that affected businesses around the world in 2018, security culture is more crucial than ever.
University of Maryland researchers warn that with limited resources, threat actors could launch a successful cyberattack on Google's bot-detecting reCaptcha service.
The evolution of users, devices and regulatory mandates has created a need for a new identity and access management framework. These nine use cases demonstrate the value of silent security solutions.
To connect the real world to the digital world, we can create digital identity models that represent a person with different attributes, characteristics and goals.
Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.
Splash Data released its list of the worst passwords of 2018. How does your enterprise stack up, and what advice can you give users to help improve their password security hygiene in the new year?
IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.
Analysts discovered a new spear phishing attack campaign from the SNAKEMACKEREL group that uses fake Brexit-related documents to infiltrate major government agencies and steal information.