July 14, 2016 Shard: Password Peace of Mind or Potential Problem? 2 min read - Shard is designed to help users track down and eliminate duplicate passwords. But what happens if cybercriminals repurpose the protective program?
Threat Intelligence July 5, 2016 Account Takeovers: They Can Happen to Anyone 4 min read - Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.
Identity & Access May 25, 2016 How to Help Prevent a Social Media Hack 4 min read - Avoiding a damaging and embarrassing social media hack starts with building security into all aspects of the organization and embracing best practices.
May 25, 2016 Social Media Compliance a Challenge for Enterprises 2 min read - Social media compliance worried respondents in one recent report, with many saying that it's difficult to enforce corporate policies.
May 23, 2016 117 Million LinkedIn Email Details Hit the Dark Web — Business as Usual? 2 min read - A years-old hack led to more than 117 million LinkedIn email addresses and passwords being posted online — and this isn't the only hack getting headlines.
May 9, 2016 Friendly Warning: PoC Exploits Dial In on Social Media Channels 2 min read - Researchers attempt to find PoC exploits with good intentions, but that doesn't stop cybercriminals from taking advantage when they have the chance.
CISO November 13, 2015 Travel Security: Training and Equipping Your Employees for Travel 3 min read - A large part of your organization's travel security strategy should include educating employees about how they should prepare for and approach travel.
Identity & Access November 6, 2015 Social Engineering Attackers Deploy Fake Social Media Profiles 2 min read - Cybercriminals are using social engineering tactics on social media networks such as LinkedIn to gain access to corporate networks.
September 22, 2015 Tweets and Turns: HTTPS Goes Live for Twitter’s t.co in October 2 min read - HTTPS is coming to a Twitter wrapper near you: The social media giant is switching to more secure URLs. What does this mean for the future of the protocol?
June 8, 2015 Enforceable AUPs Reduce Risk to Corporate Data, Study Shows 2 min read - Strict enforcement of acceptable use polices (AUPs) can dramatically reduce risk to corporate data that stems from employee Web traffic, a report showed.