How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats?

Today, the cyberthreats that pose the greatest risk to the airline industry include financially motivated attackers seeking to compromise customer data.

The post How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats? appeared first on Security Intelligence.

Continue reading How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats?

Credential-Stuffing Attacks Are Just the Tip of the Iceberg

Credential-stuffing attacks are indicative of the much larger issue of account takeover. Adaptive authentication can help improve the digital experience for low-risk users.

The post Credential-Stuffing Attacks Are Just the Tip of the Iceberg appeared first on Security Intelligence.

Continue reading Credential-Stuffing Attacks Are Just the Tip of the Iceberg

Single Sign On for Healthcare and HIPAA Compliance

Identity management in healthcare is a critical aspect of HIPAA compliance. With more and more applications offered from the cloud, healthcare organizations need to consider some form of single sign-on (SSO) to help increase IT control while making it … Continue reading Single Sign On for Healthcare and HIPAA Compliance

Will the Future of Authentication Run Into a Privacy Wall?

Digital identify, technological innovation, authentication and data privacy issues are not aligned. This impacts how we handle relationships and business. Policy issues must be resolved.

The post Will the Future of Authentication Run Into a Privacy Wall? appeared first on Security Intelligence.

Continue reading Will the Future of Authentication Run Into a Privacy Wall?

10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack

With ransomware attacks attempted every 14 seconds, security teams understand that readiness and response capabilities are critical. Prepare your organization against these 10 common security gaps.

The post 10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack appeared first on Security Intelligence.

Continue reading 10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack

How Authentication and Identification Work Together to Build Digital Trust

Building trust in an online or mobile user requires both identification and authentication.

The post How Authentication and Identification Work Together to Build Digital Trust appeared first on Security Intelligence.

Continue reading How Authentication and Identification Work Together to Build Digital Trust

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

A bigger cybersecurity budget is a tool to address security risks, business needs and industry changes. Here are 11 statistics on CISO spending to help inform your 2020 cybersecurity budget.

The post 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget appeared first on Security Intelligence.

Continue reading 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

Why Zero Trust Is Critical to a Productive Mobile Workforce

Businesses undergoing digital transformation are adopting the zero trust model to help manage the flow of corporate data to mobile devices.

The post Why Zero Trust Is Critical to a Productive Mobile Workforce appeared first on Security Intelligence.

Continue reading Why Zero Trust Is Critical to a Productive Mobile Workforce

When Digital Identity and Access Management Meets Physical Security

If your identity and access management (IAM) and physical security initiatives are not working as one, your organization may be suffering from unnecessary grief — and increasing risk.

The post When Digital Identity and Access Management Meets Physical Security appeared first on Security Intelligence.

Continue reading When Digital Identity and Access Management Meets Physical Security