How Do You Know if Your Privileged Accounts Are at Risk?

Since the majority of data breaches involve privileged accounts, it’s critical to keep those accounts as secure as possible.

The post How Do You Know if Your Privileged Accounts Are at Risk? appeared first on Security Intelligence.

Continue reading How Do You Know if Your Privileged Accounts Are at Risk?

It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Regulators and digital coin exchanges should build robust cryptocurrency security into their systems to protect themselves and individual investors from theft and fraud.

The post It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion appeared first on Security Intelligence.

Continue reading It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Identity Is the New Perimeter — But Where’s Its Firewall?

Network and endpoint access procedures have progressed to the point that now identity is the new perimeter of cybersecurity. Improving methods of multifactor authentication is crucial to building trust.

The post Identity Is the New Perimeter — But Where’s Its Firewall? appeared first on Security Intelligence.

Continue reading Identity Is the New Perimeter — But Where’s Its Firewall?

How Multifactor Authentication Can Help U.S. Government Contractors Achieve DFARS Compliance

The U.S. government’s Defense Federal Acquisition Regulation Supplement (DFARS) aims to help the DOD protect its own data and that of its business partners through multifactor authentication (MFA).

The post How Multifactor Authentication Can Help U.S. Government Contractors Achieve DFARS Compliance appeared first on Security Intelligence.

Continue reading How Multifactor Authentication Can Help U.S. Government Contractors Achieve DFARS Compliance

Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security

By adopting a multifactor authentication (MFA) solution for mainframe security, organizations can protect their most sensitive assets from cybercriminals looking to exploit stolen credentials.

The post Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security appeared first on Security Intelligence.

Continue reading Why Multifactor Authentication Is Crucial to Strengthen Mainframe Security

It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security

The increasing sophistication of the threat landscape is influencing organizations to adopt multifactor authentication to protect data on all kinds of systems, from mobile phones to mainframes.

The post It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security appeared first on Security Intelligence.

Continue reading It’s Time to Take Advantage of Multifactor Authentication for Mainframe Security

How to Deliver Frictionless Digital Trust With Pinpoint Accuracy

Companies that lack the resources to establish digital trust seamlessly, via a frictionless online experience, risk incurring high abandonment rates and low net promoter scores (NPS).

The post How to Deliver Frictionless Digital Trust With Pinpoint Accuracy appeared first on Security Intelligence.

Continue reading How to Deliver Frictionless Digital Trust With Pinpoint Accuracy

A Proposed Solution to the Password Reuse Problem

A group of researchers proposed a new framework that would enable web services to share users’ password hash data in an effort to reduce password reuse.

The post A Proposed Solution to the Password Reuse Problem appeared first on Security Intelligence.

Continue reading A Proposed Solution to the Password Reuse Problem

The Modernization Misstep: A CEO Takes on Digital Transformation

Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience.

The post The Modernization Misstep: A CEO Takes on Digital Transformation appeared first on Security Intelligence.

Continue reading The Modernization Misstep: A CEO Takes on Digital Transformation

Protecting Your Employees’ Home IT From Cyberthreats

Helping employees protect their home IT reduces enterprise security risks and helps security leaders better safeguard corporate data.

The post Protecting Your Employees’ Home IT From Cyberthreats appeared first on Security Intelligence.

Continue reading Protecting Your Employees’ Home IT From Cyberthreats