Are Passwords Now Passé?

Originated at the Massachusetts Institute of Technology in 1961, passwords have long been a central component of digital security. But in the nearly 60 years since they were first implemented as a ...
Security Boulevard
e-commerce holiday shopper using laptop

5 Ways to Enhance Customer Experience in E-commerce

E-commerce sales are projected to climb to 10% of all retail revenue for the first time by the end of 2018, with consumers expected to spend a staggering $124.1 billion over the ...
Face/Off: Security challenges in the age of facial recognition

Face/Off: Security challenges in the age of facial recognition

Facial recognition faces its share of security threats but with constant evolution in the technology, it’s rapidly fighting back against these flaws ...
via    the comic delivery system monikered  Randall Munroe  at   XKCD  !

XKCD, Machine Learning Captcha

| | Authentication, Sarcasm, satire, XKCD
via the comic delivery system monikered Randall Munroe at XKCD! ...
The 10×10 promise for magnifying email effectiveness

The 10×10 promise for magnifying email effectiveness

For marketers, email deliverability and open rates are more than core metrics. They are critical components of brand identity and whether your brand matters. Of who your brand is to customers. Of ...
yubikey jamf login

Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer ...
Context Is King When It Comes to Effective Data Protection

Context Is King When It Comes to Effective Data Protection

Armorblox is a sponsor of TechSpective Data protection is simultaneously one of the most crucial and one of the most challenging goals of cybersecurity. When push comes to shove, all of cybersecurity ...
two-factor authentication

Workarounds for Two-Factor Authentication in a Workplace That Isn’t BYOD-Friendly

Two-factor authentication can be difficult in a workplace that doesn’t allow smartphones. But it’s not impossible It’s hard to overstate how dramatically the smartphone has changed our world and our daily lives ...
Security Boulevard
PAM

Assessing Content Management System Security

As more businesses turn paperless and strive for more efficiency, content management systems become more and more popular. But having all your sensitive information in one place can be a risk. The ...
Security Boulevard

Make Sure to Cover Your Auth

Today dev, ops, and security -- all three silos -- are working in synergy in top-performing DevOps organizations - what we know as DevSecOps.Aditya Balapure (@adityabalapure) is an infosec specialist at Haven ...
Loading...