It may seem like two-factor authentication and multi-factor authentication are the same. They’re not, explains Yaser Masoudnia, the Senior Director of Product Management at LastPass.*
“Digital transformation” is the buzz word du jour in industry. But executives at RSA Security warn that it is also magnifying digital risk in ways that are easy to miss.
Third party cyber risk is a growing concern for organizations, as breaches and hacks tied to third party providers and applications multiply. How do you know if your third party cyber risk management program is up to the task? Our new e-book, sponsored by CyberGRX, will help you figure it out!
Three years after the Mirai botnet launched some of the biggest denial of service attacks ever seen, DDoS is a bigger problem and ever. Even worse: we stand on the made up of webcams and other Internet of things as technologies like 5G bring greater bandwidth to connected endpoints. In this podcast, we speak with Hardik Modi, the senior director of threat intelligence at the firm NetScout Systems* about the lessons from his company’s latest threat intelligence report.
A survey of more than 6,000 firmware images spanning more than a decade finds no improvement in firmware security and lax security standards for the software running connected devices by Linksys, NETGEAR and other major vendors.