Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.

The post Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager appeared first on Security Intelligence.

Continue reading Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

‘Tis the Season for Increased Cybersecurity Vigilance

Cybersecurity vigilance is crucial during the holiday shopping season, but it’s equally important to carry that security awareness into the new year.

The post ‘Tis the Season for Increased Cybersecurity Vigilance appeared first on Security Intelligence.

Continue reading ‘Tis the Season for Increased Cybersecurity Vigilance

Teaming Up to Overhaul Authentication

IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager.

The post Teaming Up to Overhaul Authentication appeared first on Security Intelligence.

Continue reading Teaming Up to Overhaul Authentication

Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season

Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.

The post Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season appeared first on Security Intelligence.

Continue reading Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season

Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.

The post Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM appeared first on Security Intelligence.

Continue reading Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.

The post Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month appeared first on Security Intelligence.

Continue reading Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.

The post Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month appeared first on Security Intelligence.

Continue reading Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

To protect corporate data from insider threats, security teams should leverage cognitive-enabled UBA and IGI solutions to measure users’ risk scores.

The post From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation appeared first on Security Intelligence.

Continue reading From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.

The post Security Specialists Discuss Identity and Access Management in the Age of Ransomware appeared first on Security Intelligence.

Continue reading Security Specialists Discuss Identity and Access Management in the Age of Ransomware