8 Cybersecurity Myths Debunked
The last thing any business needs is a swarm of myths and misunderstandings seeding common and frequent errors organizations of all sizes make in safeguarding data and infrastructure.
Yes, You Can Patch Stupid
Before you start calling users stupid, remember that behind every stupid user is a stupider security professional.
Should All IAM Be CIAM?
Joe Stanganelli | 1/30/2019 | CIAM vendors are right that traditional IAM isn't going to cut it for customer-facing solutions – but their sound premises have led to the perverse conclusion of keeping in-house IAM systems suboptimal. What if the power of CIAM could help employees realize better usability and security too?
FaceTime Bug an AppSec Fail
Apple has shut off Group FaceTime while it prepares a fix for a newly found security flaw found by a 14-year-old gamer.
5G Security Transformation: Why Businesses Need to Prepare Now
News Analysis-Security Now | 1/29/2019 | 5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Japan Authorizes IoT Hacking
A new campaign will see government employees hacking into personal IoT devices to identify those at highest security risk.
Why Privacy Is Hard Work
For Data Privacy Day, let's commit to a culture of privacy by design, nurtured by a knowledgeable team that can execute an effective operational compliance program.
The Evolution of SIEM
Expectations for these security information and event management systems have grown over the years, in ways that just aren't realistic.
|