The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit-card applications at Capital One. The story hit headlines for months, and with much reason—after all, it’s not every day that the social security numbers, bank account numbers, credit scor...
Read more
The NIST report, Special Publication 1800-17, titled “Multifactor Authentication for E-Commerce”, offers insight on how companies that want to put more security in place at their point of sale and checkout operations by using multifactor authentication (MFA).
Read more
The working group will investigate the rapidly developing area of distributed ledger technology thought to have considerable potential for both the public and private sectors. StrongKey CTO and Forbes Security Council Member, Arshad Noor, has been appointed to serve as chair for the working group.
Read more
What will drive the end of the password era? The biggest driver will be the potential for breach and the expenses associated with it — not just the financial costs, but the reputation damage that accompanies it.
Read more
Digital transformation has brought about unprecedented opportunities for the healthcare industry, along with unforeseen pitfalls. Healthcare providers subscribe to the notion of “duty of care,” but what does it mean to use reasonable care when you are dealing with safeguarding sensitive protected he...
Read more
The Hippocratic oath and the principles embodied in “duty of care” guide the daily actions of healthcare providers. But when it comes to information security and protecting sensitive PHI, is the healthcare community living up to those principles?
Read more
In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more insidious picture being overlooked.
Read more
The FIDO Alliance has gained support from another tech giant, getting one step closer to solving the world's password problem.
Read more
The poor state of cloud security must remain top of mind for organizations invested in the cloud or migrating to it.
Read more
Encryption and authentication — let's learn more about why your company needs these security tools.
Read more