Join the Community

23,247
Expert opinions
43,779
Total members
372
New members (last 30 days)
182
New opinions (last 30 days)
29,055
Total comments

Latest expert opinions

clear
clear

96 Results from 2016, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Popular Passwords make it easy to hack You

Your account passwords should be as unique as your fingerprint—to make them less hackable by crooks using password-guessing software that can run through millions of possible combinations in just minutes. And if you have an easy password, there may be a hit within 10 seconds. Think this software can figure out your password of “password1” or “monk...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Bank Tellers stealing Identities

Ever consider the possibility that a person gets a job as a bank teller…for the sole purpose of stealing a patron’s identity? Do you realize how easy this would be? No techy hacking skills required. No gun required. So we’ve all been instilled with fear of our bank getting data breached by Russian hacking rings, while that mousy looking teller wi...

/security

Retired Member

Retired Member 

DevSecOps: How DevOps and Automation Bolster Security, Compliance

DevOps bridges the gap between Development and Operations to accelerate software delivery and increase business agility and time-to-market. With its roots in the Agile movement, DevOps fosters collaboration between teams and streamlines processes, with the goal of breaking silos in order to “go fast”. Information Security (InfoSec) and compliance ...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Can the cloud be trusted?

Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe? A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The cloud is made of millions of servers across the globe and most are o...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

My EMV for a Week Challenge is DONE!

This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a real-world take on the EMV card experience, which includes the security benefits EMV c...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Eight ways to secure your employees' mobile devices

Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on. What does it all mean? Companies must take extra precautions to ensure that sens...

/security

Retired Member

Retired Member 

What the rise of wearables means for authentication

Reading the coverage of CES this year, it was possible to draw two conclusions about wearable technology. Firstly, wearable technology is now an established market – a fast-growing segment with lots of innovation that is now much more than just fitness bands and smartwatches. The second is that the variety of “innovations” suggests that wearable t...

/security /payments

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

2016 Information Security Predictions

No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off… Wearable Devices Cyber crooks don’t care what kind of data is in that little device strapped around your upper arm while you exercise, but th...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

11 Ways to Mitigate Insider Security Threats

Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organizations should take to mitigate these threats and protect important company data: Always encrypt your data If you want to minimize the impact of an...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Pay attention to your IoT Device Security

Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches… Slow down. Don’t buy a single smart device until you ask yourself these 10 questions. And frankly, there’s a...

/security

Now Hiring