The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit-card applications at Capital One. The story hit headlines for months, and with much reason—after all, it’s not every day that the social security numbers, bank account numbers, credit scor...
Read more
The NIST report, Special Publication 1800-17, titled “Multifactor Authentication for E-Commerce”, offers insight on how companies that want to put more security in place at their point of sale and checkout operations by using multifactor authentication (MFA).
Read more
What will drive the end of the password era? The biggest driver will be the potential for breach and the expenses associated with it — not just the financial costs, but the reputation damage that accompanies it.
Read more
Digital transformation has brought about unprecedented opportunities for the healthcare industry, along with unforeseen pitfalls. Healthcare providers subscribe to the notion of “duty of care,” but what does it mean to use reasonable care when you are dealing with safeguarding sensitive protected he...
Read more
The Hippocratic oath and the principles embodied in “duty of care” guide the daily actions of healthcare providers. But when it comes to information security and protecting sensitive PHI, is the healthcare community living up to those principles?
Read more
In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more insidious picture being overlooked.
Read more
The poor state of cloud security must remain top of mind for organizations invested in the cloud or migrating to it.
Read more
Encryption and authentication — let's learn more about why your company needs these security tools.
Read more
In the fast-moving world of DevOps, security sometimes got left by the wayside on the way to the next iteration. But today's threat landscape is so perilous that developers need to have solid security top of mind as they design and build applications. This includes features like user authentication,...
Read more
Roberta Mullin talks to Arshad Noor, CTO of StrongKey. He talks about his presentation on "Duty of Care and Information Security"
Read more