26 November 2014

Security

Robert SicilianoIDTheftSecurity.com - Boston

How The Internet of Things can go very wrong

16 hours ago  |  374 views  |  0  |  Recommends 0

The Internet—one of history’s greatest inventions—is also one of history’s greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things. Med-hacking. Researchers have hacked many medical devices. Though it apparently hasn’t happened in the real world, yet, but it looks like it’s only a matter of time before med...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

10 tips to Secure Passwords

20 November 2014  |  999 views  |  0  |  Recommends 0

Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remember and sentimental to use, this approach makes a hacker’s job all too easy. Here are 10 things you should know about passwords. Never use the sam...

TagsSecurity
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

Hackers and Banks win, Clients lose

12 November 2014  |  1347 views  |  0  |  Recommends 0

Don’t blame the hackers; don’t blame the bank; apparently it’s the victim’s fault that a Missouri escrow firm was robbed of $440,000 in a cybercrime, says a report on computerworld.com. The attack ...

TagsSecurity
Jean-Claude BellandoAxway - Paris

Making IT work in a merger and acquisition environment

11 November 2014  |  1868 views  |  0  |  Recommends 0

In a single move, mergers and acquisitions can provide businesses with a tremendous tool for increasing growth, profitability and improving strategic capabilities. M&As are gathering speed and las...

TagsSecurityRisk & regulation
Máté EizenbergerMisys - Budapest

Is 'good-enough' security good enough for Mobile Banking?

11 November 2014  |  3710 views  |  3  |  Recommends 1

CEB TowerGroup predicts mobile banking usage will reach 17 billion transactions in 2015. At the same time, customers are still worried about security, which is the number one fear among potential mo...

TagsSecurityMobile & online
Robert SicilianoIDTheftSecurity.com - Boston

Security is Everyone’s responsibility

08 November 2014  |  970 views  |  0  |  Recommends 0

In the movies, the good guys always get the bad guys. In cyber reality, no such thing exists. A survey of 5,000 IT security professionals turns up the following: 63% doubt they can stop data breac...

TagsSecurity
Stephen MidgleyAbsolute Software - Vancouver

Working with your CIO to negotiate GRC - Part Two

07 November 2014  |  1698 views  |  0  |  Recommends 0

In part one of this blog series, I explained that firms need to take a holistic three stage approach to ensure data is kept secure, and therefore comply with data protection regulation and avoid fines...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Expect all Free Mobile Apps to leak your Data

04 November 2014  |  1300 views  |  0  |  Recommends 0

Mashable.com says that recently over 98,000 photos have been leaked from Snapsaved.com, which has shut down. The Snapchat app makers won’t take any credit, even though previously, 4.7 million phone nu...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Steps to Manage a secure online backup

29 October 2014  |  993 views  |  0  |  Recommends 0

Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should...

TagsSecurity
Chris SullivanCourion - London

Can cyber criminals spark the next financial crisis?

29 October 2014  |  2215 views  |  0  |  Recommends 0

Earlier this month Mark Boleat, head of policy for the City of London, gave a serious warning to the financial services industry as he prepared to address the Institute of International Finance in Was...

TagsSecurityRisk & regulation
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,301
Active bloggers
24,821
Members
8,270
Posts
11,538
Comments

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Máté Eizenberger

As a Mobile Product Manager I'm responsi...

Chris Sullivan

As Vice President of Advanced Solutions,...

Who is commenting on Security posts

Bjorn Soland
Dean Wallace
Máté Eizenberger
Ketharaman Swaminathan
Stephen Brown
Pat Carroll
Melvin Haskins