Close the Gap on Advanced Threats With Integrated Security

Advanced threats are evolving faster than enterprise security, despite record spend. Organizations need an integrated ecosystem of solutions that provide visibility into anomalies and potential risks.

The post Close the Gap on Advanced Threats With Integrated Security appeared first on Security Intelligence.

Continue reading Close the Gap on Advanced Threats With Integrated Security

The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns

Holiday spending is on the rise both in-store and online. How can retailers ensure PCI compliance to manage large transaction volumes and post-holiday refunds?

The post The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns appeared first on Security Intelligence.

Continue reading The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns

We Need to Talk About NIST’s Dropped Password Management Recommendations

NIST has changed its long-standing recommendations for password management, favoring minimal user friction over complexity requirements and regular password updates.

The post We Need to Talk About NIST’s Dropped Password Management Recommendations appeared first on Security Intelligence.

Continue reading We Need to Talk About NIST’s Dropped Password Management Recommendations

Cyber Monday 2018: 5 Best Practices to Protect Consumer Data

Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?

The post Cyber Monday 2018: 5 Best Practices to Protect Consumer Data appeared first on Security Intelligence.

Continue reading Cyber Monday 2018: 5 Best Practices to Protect Consumer Data

Digital Identity Trust: A New Way to Authenticate

When building digital identity trust, security teams have historically struggled to find a balance between security and customer convenience. But what if they could have both?

The post Digital Identity Trust: A New Way to Authenticate appeared first on Security Intelligence.

Continue reading Digital Identity Trust: A New Way to Authenticate

How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.

The post How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices? appeared first on Security Intelligence.

Continue reading How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

Is Your Site Protected Against Drupal Security Flaws?

This past summer saw a pair of Drupal security flaws exposed and patched. Is your website secure?

The post Is Your Site Protected Against Drupal Security Flaws? appeared first on Security Intelligence.

Continue reading Is Your Site Protected Against Drupal Security Flaws?

The Inconvenient Truth About Your Eight-Character Password

Your eight-character password is not as secure as you might think, but there are several simple actions you can take to truly strengthen your password security.

The post The Inconvenient Truth About Your Eight-Character Password appeared first on Security Intelligence.

Continue reading The Inconvenient Truth About Your Eight-Character Password

SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks

While massive data breaches typically hog all the cybersecurity headlines, SMB security is also at risk as cybercriminals go after easy targets with low IT budgets.

The post SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks appeared first on Security Intelligence.

Continue reading SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks

Supporting the Shift to Passwordless Authentication With FIDO

IBM is embracing FIDO authentication across its offerings as part of its effort to shift the industry toward a standardized approach to authentication and the eventual end of passwords.

The post Supporting the Shift to Passwordless Authentication With FIDO appeared first on Security Intelligence.

Continue reading Supporting the Shift to Passwordless Authentication With FIDO