4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise

How does Star Trek’s information security stack up against current cybersecurity hygiene best practices? Turns out the future’s not so bright.

The post 4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise appeared first on Security Intelligence.

Continue reading 4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise

Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication

Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.

The post Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication appeared first on Security Intelligence.

Continue reading Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication

How to Make Third-Party Risk Management Second Nature

Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.

The post How to Make Third-Party Risk Management Second Nature appeared first on Security Intelligence.

Continue reading How to Make Third-Party Risk Management Second Nature

Long Live the Password — Even if You Don’t Want It To

To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.

The post Long Live the Password — Even if You Don’t Want It To appeared first on Security Intelligence.

Continue reading Long Live the Password — Even if You Don’t Want It To

Reap the Promise of One and Done Authentication With SSO

With SSO, employees can use one set of credentials to access all their apps instead of remembering, looking up and frequently resetting multiple passwords.

The post Reap the Promise of One and Done Authentication With SSO appeared first on Security Intelligence.

Continue reading Reap the Promise of One and Done Authentication With SSO

To Move Forward Securely, Look Backward With Ongoing Risk Assessments

If we focus on the future at the expense of performing risk assessments to maintain defenses against existing threats, we will always be one step behind attackers.

The post To Move Forward Securely, Look Backward With Ongoing Risk Assessments appeared first on Security Intelligence.

Continue reading To Move Forward Securely, Look Backward With Ongoing Risk Assessments

Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

A notable takeaway from the report was that despite fewer reported data breaches, 2018 witnessed a 126 percent uptick in the number of records breached containing personally identifiable information.

The post Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches appeared first on Security Intelligence.

Continue reading Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Spring is just around the corner, which means it’s time for CISOs to evaluate their security strategy, eliminate processes that aren’t working, and adopt new cybersecurity practices and technologies.

The post Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices appeared first on Security Intelligence.

Continue reading Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.

The post Are Passwords Killing Your Customer Experience? Try Passwordless Authentication appeared first on Security Intelligence.

Continue reading Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand

When framed as an innovative, even “cool” feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience.

The post Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand appeared first on Security Intelligence.

Continue reading Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand