12 February 2016

Security

Thomas JorgensenEncap Security - Oslo

What the rise of wearables means for authentication

09 February 2016  |  2918 views  |  1  |  Recommends 1

Reading the coverage of CES this year, it was possible to draw two conclusions about wearable technology. Firstly, wearable technology is now an established market – a fast-growing segment with lots of innovation that is now much more than just fitness bands and smartwatches. The second is that the variety of “innovations” suggests that wearable t...

TagsSecurityPayments
Robert SicilianoIDTheftSecurity.com - Boston

2016 Information Security Predictions

02 February 2016  |  2376 views  |  0  |  Recommends 0

No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off… Wearable Devices Cyber crooks don’t care what kind of data is in that little device strapped around your upper arm while you exercise, but th...

TagsSecurity
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

11 Ways to Mitigate Insider Security Threats

02 February 2016  |  1517 views  |  0  |  Recommends 0

Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organ...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Pay attention to your IoT Device Security

26 January 2016  |  1879 views  |  0  |  Recommends 0

Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” ...

TagsSecurity
Gina GhentMarkit - New York

Top factors driving a revolution in third party risk management

25 January 2016  |  2143 views  |  0  |  Recommends 0

Third party risk management is making headlines and for some very good reasons. Why? Structural factors are forcing a complete rethink of current practices. Financial institutions and third parties a...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

How to Remove Fraudulent Lines of Credit

22 January 2016  |  1065 views  |  0  |  Recommends 0

You just learned you have a new credit card account by checking your credit or because a bill collector called you. Problem is that you don’t remember ever applying for it. You must find out what’s be...

TagsSecurity
Ajit TripathiBig 4 Consulting Firm - London

Blockchain and The Seven Principles of Digital Identity

21 January 2016  |  3248 views  |  1  |  Recommends 0

Let's Get Back to Productive Work: The recent and very public departure of Mike Hearn from Bitcoin has temporarily distracted the broader Blockchain community from the three problems that the Fintech ...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Hackers don't play well with Kids' Toys

14 January 2016  |  1309 views  |  0  |  Recommends 0

No company is immune from hackers—even a toy company. Hong Kong based VTech got hit by a hacker recently. This company makes techy educational toys for kids, and its database got breached. Customers g...

TagsSecurity
Paul DignanF5 Networks - London

Dealing with Dridex - protecting end-users from new strains of malware

13 January 2016  |  1714 views  |  0  |  Recommends 0

Last year, criminals used new strains of malware to steal £20 million from UK banking customers, highlighting the dangers of such viruses in a very high-profile way. The use of Dridex malware to infe...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Busted!: Large Identity Fraud Rings Fall Apart

07 January 2016  |  1928 views  |  0  |  Recommends 0

A group of people who are actively collaborating to commit identity fraud is known as an identity fraud ring. These rings are generally made up of two or more career criminals, often including family ...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
26,260
Members
14,696
Comments
9,752
Posts
 
1,056
Active bloggers

Top security posts in last 5 days

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Ajit Tripathi

Director, Blockchain & Analytics. Al...

Gina Ghent

Managing director and head of Know Your...

Who is commenting on Security posts

Balasubramaniam GD
Ajit Tripathi
Fergus Lemon