The New NIST Digital Identity Guidelines and What They Mean to You

With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.

The post The New NIST Digital Identity Guidelines and What They Mean to You appeared first on Security Intelligence.

Continue reading The New NIST Digital Identity Guidelines and What They Mean to You

Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.

The post Cybercriminals Are Getting Better at Using Advanced Authentication Methods appeared first on Security Intelligence.

Continue reading Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Why Cryptography Is the New Gold for Banking and Blockchain

Blockchain and Cryptography: The New Gold Standard Over the past 200 years, the role of gold in international trade has been undeniable as a means to standardize prices across currencies and secure payments across borders. Before 1875, global financial systems based prices on the amount of gold held in coins, which could then be exchanged […]

The post Why Cryptography Is the New Gold for Banking and Blockchain appeared first on Security Intelligence.

Continue reading Why Cryptography Is the New Gold for Banking and Blockchain

What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.

The post What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation appeared first on Security Intelligence.

Continue reading What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation

A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks

Department heads have to start thinking about risk management in terms of acceptable risk levels, not compliance requirements to mark off a checklist.

The post A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks appeared first on Security Intelligence.

Continue reading A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks

How to Make the Most of Your Pen Test

A pen test can be tremendously valuable for your team and organization, but you have to know how to glean the key lessons from the experience.

The post How to Make the Most of Your Pen Test appeared first on Security Intelligence.

Continue reading How to Make the Most of Your Pen Test

A Future Full of Drones — and the Advanced Threats They Present

Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations.

The post A Future Full of Drones — and the Advanced Threats They Present appeared first on Security Intelligence.

Continue reading A Future Full of Drones — and the Advanced Threats They Present