Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

How to Set Up a Password Manager

If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than eve...

24 Oct 2015
Robert Siciliano

Credit Card vs. Debit Card Fraud

One difference between a credit card and a debit card is that if there’s an unauthorized charge on your credit card, you just get a little sting. It’s a hassle to straighten out. But no money is taken...

22 Oct 2015
Robert Siciliano

The Password Reset Isn't How to Remember a Password

Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now...

17 Oct 2015
A Finextra Member

Bring Your Own Authentication: the Alpha and Omega of FinTech

European regulators have issued a certain number of recommendations regarding the security of electronic payments[1]. However, in terms of technology, the power is still is the hands of the users, as ...

16 Oct 2015
Robert Siciliano

Weak Passwords Mean Data Breaches

Studies across the board indicate that weak usernames and passwords are one of the top causes of data breaches, and I find that information to be unfortunate, because it is preventable. According to a...

15 Oct 2015
Robert Siciliano

How to prevent your Pics from being lifted: Part 1 of 2

You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission. So how does someone steal your image or u...

13 Oct 2015
A Finextra Member

Security in the Finance Sector: Who’s Role Is It Anyway?

Despite increasing regulations across the finance sector globally, fraud and associated risks continue to increase—and at a staggering pace. Thomson Reuters was recently quoted as saying, “Increased r...

11 Oct 2015
Robert Siciliano

Why You Should Use a Password Manager

Most experts in cybersecurity suggest that computer users utilize a password manager, and I think they have a great point. These managers ensure that you can use a unique, strong password for all onli...

10 Oct 2015
Robert Siciliano

Why use a VPN?

If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accoun...

03 Oct 2015
Paul Hampton

How to ensure secure contactless payments

The use of online banking and shopping has grown significantly, but so too has the number of security threats targeting such services. According to the latest Breach Level Index report, 888 data brea...

01 Oct 2015
Robert Siciliano

What is a Hacker?

You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with v...

01 Oct 2015
A Finextra Member

Blockchain and the Digitisation of Regulation

A Hacker in Business School As the Java style capitalisation in 'CryptoSecurities' suggests, I was a proper nerd before I took a left turn into a top business school and later became a financial servi...

30 Sep 2015

Now hiring