Connected Toys: What Are the Security & Privacy Risks?

Connected Toys: What Are the Security & Privacy Risks?

(written with Eliyah Havemann and Dan Bloom) As we approach the end of the year and enter the season of holiday gifting, it’s an excellent time to weigh-in on “high tech” connected ...

Strong Authentication is Good, Unless …

… it results in your being arrested! In her September 28, 2019 article, “Army communication head at Mar-a-Lago sentenced for lying,” Jane Musgrave describes how an army officer in charge of communications ...

Are Passwords Now Passé?

Originated at the Massachusetts Institute of Technology in 1961, passwords have long been a central component of digital security. But in the nearly 60 years since they were first implemented as a ...
Security Boulevard
8 Online Shopping Security Tips for Cyber Monday

8 Online Shopping Security Tips for Cyber Monday

As the online equivalent to Black Friday, Cyber Monday is among the biggest online shopping days of the year. Cyber Monday, along with Black Friday, heralds the beginning of the online holiday ...
Skills Gap

Think Outside the Box to Close the Skills Gap

The skills gap in cybersecurity is a topic I address a lot, but it is also one of the issues in cybersecurity for which we just can’t figure out the solution. It ...
Security Boulevard
The London Protocol Improve Identity Assurance

The London Protocol: An Initiative to Improve Identity Assurance

Can today’s data security technologies protect us from the phishing attacks? Is there an ultimate way to combat phishing once and for all? Five leading certificate assurance (CA) companies have joined their ...
Security Boulevard

How Cybercriminals Are Getting Initial Access into Your System

This article covers the main techniques cybercriminals use at the initial stage of attacks against enterprise networks. There are several dangerous phases of cyberattacks targeting the corporate segment. The first one encountered ...
5 Industries Grappling with Bad Bots

The Top 5 Industries Grappling with Bad Bots

2018 was the year bots went mainstream, as we learn more and more each day about Russia’s influence over the 2016 U.S. presidential election and watch as two of the most popular ...
Security Boulevard
malware spy vs. spy

FireEye Focuses on Email Security Analysis with Free Offering

FireEye has begun offering a free service through which IT organizations can evaluate their email security, as those systems have become the primary mechanism through which malware gets introduced into the enterprise ...
Security Boulevard