96 Results from 2016, /security
Robert Siciliano Security Analyst at Safr.me
Your account passwords should be as unique as your fingerprint—to make them less hackable by crooks using password-guessing software that can run through millions of possible combinations in just minutes. And if you have an easy password, there may be a hit within 10 seconds. Think this software can figure out your password of “password1” or “monk...
02 March 2016 /security
Ever consider the possibility that a person gets a job as a bank teller…for the sole purpose of stealing a patron’s identity? Do you realize how easy this would be? No techy hacking skills required. No gun required. So we’ve all been instilled with fear of our bank getting data breached by Russian hacking rings, while that mousy looking teller wi...
01 March 2016 /security
Retired Member
DevOps bridges the gap between Development and Operations to accelerate software delivery and increase business agility and time-to-market. With its roots in the Agile movement, DevOps fosters collaboration between teams and streamlines processes, with the goal of breaking silos in order to “go fast”. Information Security (InfoSec) and compliance ...
25 February 2016 /security
Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe? A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The cloud is made of millions of servers across the globe and most are o...
22 February 2016 /security
This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a real-world take on the EMV card experience, which includes the security benefits EMV c...
20 February 2016 /security
Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on. What does it all mean? Companies must take extra precautions to ensure that sens...
15 February 2016 /security
Reading the coverage of CES this year, it was possible to draw two conclusions about wearable technology. Firstly, wearable technology is now an established market – a fast-growing segment with lots of innovation that is now much more than just fitness bands and smartwatches. The second is that the variety of “innovations” suggests that wearable t...
09 February 2016 /security /payments
No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off… Wearable Devices Cyber crooks don’t care what kind of data is in that little device strapped around your upper arm while you exercise, but th...
02 February 2016 /security
Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organizations should take to mitigate these threats and protect important company data: Always encrypt your data If you want to minimize the impact of an...
Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches… Slow down. Don’t buy a single smart device until you ask yourself these 10 questions. And frankly, there’s a...
26 January 2016 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.