It’s important that any alternative simplifies authentication. Companies and agencies don’t expect their employees to configure firewalls or actively manage encryption on their laptops; security controls have become increasingly automated over the last few years. But amidst these improvements, there’s one item that continues to get pushed down to customers and end-users: The burden of […]

by

It’s important that any alternative simplifies authentication. Companies and agencies don’t expect their employees to configure firewalls or actively manage encryption on their laptops; security controls have become increasingly automated over the last few years. But amidst these improvements, there’s one item that continues to get pushed down to customers and end-users: The burden of […]

by

It’s important that any alternative simplifies authentication. Companies and agencies don’t expect their employees to configure firewalls or actively manage encryption on their laptops; security controls have become increasingly automated over the last few years. But amidst these improvements, there’s one item that continues to get pushed down to customers and end-users: The burden of […]

by

Along with the progression of technology comes the progression of cyber security threats. Cyber security has become the most talked about issue in the industry, and companies are looking for the right solution to combat this threat. FireEye Inc. is a company that provides premium cyber threat protection and helps companies prepare for the worst, […]

by

The Department of Health and Human Services (HHS) awarded $350,000 to help its partners in the health care and public health sectors ward off cyberattacks. This funding comes in the form of two cooperative agreements that will establish a “more vibrant cyber information sharing ecosystem” between partners. HHS’s Office of the National Coordinator for Health […]

by

Your identity certainly isn’t safe anymore –– anywhere. Consider how hackers a few years ago installed malware on cash register systems at 2,200 Home Depot stores and took credit card information belonging to as many as 56 million customers. Or more recently, the Penn State Alumni Association discovered one of its contractors, ComNet Marketing Group […]

by

As enterprises accelerate their use of cloud computing, online services, and ready themselves for internet of things deployments, they are finding themselves strained to find the cybersecurity talent and security tools needed to secure these efforts. That’s one of the most important takeaways from the Global State of Information Security Survey (GSISS) 2017 — a […]

by

The Department of Health and Human Services (HHS) awarded $350,000 to help its partners in the health care and public health sectors ward off cyberattacks. This funding comes in the form of two cooperative agreements that will establish a “more vibrant cyber information sharing ecosystem” between partners. HHS’s Office of the National Coordinator for Health […]

by