Please turn on your JavaScript for this page to function normally.
Online summer travel scams to watch out for

Iovation released a list of common online summer travel scams to watch out for. The company also announced that it has seen a hundred percent increase in online travel …

How to turn on two-factor authentication on over 100 popular online services

TeleSign launched Turn It On, a new campaign featuring a guide to two-factor authentication and providing step-by-step instructions for turning on 2FA for over a 100 popular …

Cloud SaaS data protection strategies

Handing control of sensitive data to a third-party cloud service provider remains one of the biggest data compliance challenges today. Top executives from Perspecsys are on …

Cookie warnings: Useless and bad for security?

Cookies are the official and standard and preferred way of keeping state in the (otherwise) stateless HTTP protocol. They are sometimes used for keeping track of a user beyond …

The challenges of data classification

We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. From information gateways, websites, …

Drone detection: What works and what doesn’t

Another drone was discovered flying in restricted air space around the White House two weeks ago. The Secret Service found the pilot simply because they happened to see him. …

Breach detection: Five fatal flaws and how to avoid them

When the Sarbanes-Oxley Act of 2002 was passed, it fell on corporate security teams to translate its requirements into technical controls. That threw the IT Security function …

How businesses can stem the flow of leaky data

The privacy and security of corporate data is at risk like never before. Not only are businesses faced with an ever-growing variety of security threats, from sophisticated, …

Internet of Things: Whose data is it, anyway?

Everywhere you look, it seems to be that everything is becoming “smart”. On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate …

Why insider threats are succeeding

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or …

Travel smart: Tips for staying secure on the road

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your …

Account recovery via secret questions is a bad idea

Secret questions offer far lower security than user-chosen passwords, and should never be used as the only way to reclaim access to a lost account, Google researchers have …

Don't miss

Cybersecurity news