Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors – many owned by Chinese firms – process discarded hardware and data with little oversight.
The average employee in the workplace has 191 passwords. Will we ever rid ourselves of them and, if so, how? Gerald Beuchelt, the Chief Information Security Officer at LogMeIn talks about how changes in authentication may deliver a passwordless future.
It may seem like two-factor authentication and multi-factor authentication are the same. They’re not, explains Yaser Masoudnia, the Senior Director of Product Management at LastPass.*
Like leather upholstery for your new car, add-ons to your threat intelligence service are hard to resist. But Chris Camacho of Flashpoint* says “buyer beware:” threat intel add-ons may be more trouble than they’re worth. If you’ve ever shopped for a new car, you’re likely familiar with the dizzying number of add-on features available—from custom paint jobs to built-in navigation systems. These features are enticing for an obvious reason: they enable you to customize your car to your preferences, and often at a reasonable price point. Add-ons exist for more than just cars, of course. They’re increasingly available in the threat intelligence market, particularly with respect to datasets. Deep & Dark Web (DDW) data add-ons have grown especially prevalent in recent years, but as with any security-oriented product or service, these offerings aren’t suitable for everyone. Here are some key factors to consider before purchasing a DDW data add-on for your […]
Your search results are the next frontier for online scammers and fraud, including identity theft, warns Angel Grant of RSA’s Fraud & Risk Intelligence group.*