Why the EU Is More Likely to Drive IT and Security Trends Than the US

EU companies are far ahead of their U.S. counterparts in terms of adopting IT and security trends, according to recent research.

The post Why the EU Is More Likely to Drive IT and Security Trends Than the US appeared first on Security Intelligence.

Continue reading Why the EU Is More Likely to Drive IT and Security Trends Than the US

Consumer Data Protection Act: Forcing Accountability

A U.S. senator wants to make corporate executives held responsible for data breaches that result in the theft or compromise of consumer personally identifiable information (PII). It seems that Oregon Sen. Ron Wyden, like millions of Americans, had bec… Continue reading Consumer Data Protection Act: Forcing Accountability

Your Employees Pose a Bigger Security Risk Than You Think

Ask a security expert what an organization’s biggest risk or threat is, they answer is almost always “the human factor.” While that could include anybody with access to your network or data, it really means your employees. As someone recently said to … Continue reading Your Employees Pose a Bigger Security Risk Than You Think

Security in Digital Transformation: Think of It as Risk Management

You know something has gone mainstream when you see it featured in a television commercial. I noticed it with cybersecurity and then with cloud computing, and the other night, I saw a tech company advertisement discussing the digital transformation. T… Continue reading Security in Digital Transformation: Think of It as Risk Management

How to Secure Mobile Messaging in Your Enterprise

Two decades ago, AOL’s Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.

The post How to Secure Mobile Messaging in Your Enterprise appeared first on Security Intelligence.

Continue reading How to Secure Mobile Messaging in Your Enterprise

Schneier: Security Tough in the ‘Computerization of Everything’

We’re moving to a world where everything is going to be a computer, and we aren’t ready for the security consequences. That was an overarching theme of security guru Bruce Schneier’s keynote address at this year’s SpiceWorld event in Austin, Texas. It… Continue reading Schneier: Security Tough in the ‘Computerization of Everything’

Survey: Businesses Won’t Be Ready for CCPA

In July, I discussed one of the first U.S. responses to GDPR, the California Consumer Privacy Act (CCPA), which is supposed to go into effect Jan. 1, 2020. Tech companies oppose the law and are fighting to get it changed. And based on a new survey fro… Continue reading Survey: Businesses Won’t Be Ready for CCPA

Real or Fake? The Difficulty in Detecting Fraudulent Identity

Am I who you think I am? My name is on this article, right next to a picture. You could send me a comment on Twitter or do a Google search to see if I’m legitimate. But is that really enough proof to prove my identity, to show that I am the actual per… Continue reading Real or Fake? The Difficulty in Detecting Fraudulent Identity

As IoT Security Concerns Rise, Are Solutions Keeping Up?

This year, IoT security jumped in importance for many security professionals as enterprises continue to adopt more IoT technologies. Now, our security tools and solutions need to catch up.

The post As IoT Security Concerns Rise, Are Solutions Keeping Up? appeared first on Security Intelligence.

Continue reading As IoT Security Concerns Rise, Are Solutions Keeping Up?

Does Your Biometric and Behavioral Biometric Data Meet Data Privacy Compliances?

With passwords so vulnerable to compromise, there is a never-ending search for the best authentication method. Biometrics gets discussed a lot as a secure and logical login option because, theoretically, no one should be able to reproduce your retina … Continue reading Does Your Biometric and Behavioral Biometric Data Meet Data Privacy Compliances?