Threat Intelligence July 5, 2016 Account Takeovers: They Can Happen to Anyone 4 min read - Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.
June 21, 2016 Akamai Says Subtlety Is Out, Brute Force Is In for Identity Theft 2 min read - New security research from Akamai found that brute-force attacks are making a comeback thanks to their low-risk, high-reward nature.
Identity & Access June 13, 2016 Access Controls and the Inability to Keep Up 4 min read - The mindset of prescribing one-dimensional access controls hasn't been effective, so enterprises are now shifting toward end-to-end controls.
X-Force June 3, 2016 Compromised Before My Very Eyes: How I Almost Got Hacked 3 min read - Here's the story of how I almost got hacked — and what you can learn from my close call to ensure the data breach doesn't happen to you.
Identity & Access May 25, 2016 How to Help Prevent a Social Media Hack 4 min read - Avoiding a damaging and embarrassing social media hack starts with building security into all aspects of the organization and embracing best practices.
X-Force March 18, 2016 Is It the Breadth of the Breach or the Value of the Volume? 3 min read - Organizations that suffer a breach face extremely high costs, but cybercriminals don't have to cough up as much to start building profiles of victims.
March 14, 2016 Password Strength May Trump Frequent Changes, FTC Expert Says 2 min read - Lorrie Cranor, the chief technologist of the FTC, urged users to increase password strength rather than rely on frequent changes.
Healthcare February 4, 2016 What Makes for a Useful Medical Patient Portal? 3 min read - Having a patient portal that's high on security and usability is essential for modern health care practitioners. What are the benefits of these systems?
January 26, 2016 Are You Even Trying? Password Hacks Still Happening as Users Miss the Message 3 min read - Despite numerous warnings and regulations regarding passwords, users continue to use weak personal codes and leave themselves open to password hacks.
Identity & Access January 6, 2016 Getting Rid of the Password: Smartphones to the Rescue 2 min read - New approaches to authentication by Google and Yahoo will likely supplant the traditional password with messages sent to smartphones.