Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother’s fingerprint to satisfy the authentication requirements on her phone.

The post Hacked by a Kid?! A Story to Illustrate the State of Authentication Today appeared first on Security Intelligence.

Continue reading Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime

User behavior analytics solutions can help security operations teams analyze users’ habits for anomalies that might expose a threat.

The post Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime appeared first on Security Intelligence.

Continue reading Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime

Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

All access is not created equal. To protect your crown jewels from an insider threat, it’s critical to know your data and, more importantly, your users.

The post Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data appeared first on Security Intelligence.

Continue reading Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

All access is not created equal. To protect your crown jewels from an insider threat, it’s critical to know your data and, more importantly, your users.

The post Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data appeared first on Security Intelligence.

Continue reading Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

How Can You Quantify the Value of Automated Provisioning and Deprovisioning?

IT managers can justify security spending by emphasizing the value of provisioning and deprovisioning to improve the user experience and security policies.

The post How Can You Quantify the Value of Automated Provisioning and Deprovisioning? appeared first on Security Intelligence.

Continue reading How Can You Quantify the Value of Automated Provisioning and Deprovisioning?

How Can You Quantify the Value of Web Access Enforcement?

Each business is responsible for establishing its own system for evaluating web access enforcement based on the particular needs of the organization.

The post How Can You Quantify the Value of Web Access Enforcement? appeared first on Security Intelligence.

Continue reading How Can You Quantify the Value of Web Access Enforcement?

Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.

The post Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program appeared first on Security Intelligence.

Continue reading Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do

Access Management Resolution in the Digital Era

As organizations continue to embrace the digital era and cloud services, it’s more important than ever to find an access management resolution.

The post Access Management Resolution in the Digital Era appeared first on Security Intelligence.

Continue reading Access Management Resolution in the Digital Era