Upon analyzing a massive password dump, Duo Labs concluded that users are slowly but surely adopting recommended password security best practices.
Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.
Blockchain and Cryptography: The New Gold Standard Over the past 200 years, the role of gold in international trade has been undeniable as a means to standardize prices across currencies and secure payments across borders. Before 1875, global...
IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
Department heads have to start thinking about risk management in terms of acceptable risk levels, not compliance requirements to mark off a checklist.
A pen test can be tremendously valuable for your team and organization, but you have to know how to glean the key lessons from the experience.
Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations.
The National Institute of Standards and Technology (NIST) announced two block cipher algorithms that will preserve data formatting in secure POS systems.
Fine-grained access controls such as the ones included in IBM Guardium products may be just the thing needed to enhance data privacy.
New, free SSL encryption tests can show areas for improvement with regard to email protection and the best practices for maintaining application security.