Find out where we’re trending in the industry.
RSA Conference Security Report Round UpMarch 6, 2014
CSO | Visit a security-focused conference and it’s a sure bet that several vendors will be spruiking their latest security report. This year's RSA Conference was not exception. We take a look at some of the reports and see if there's anything new that CSOs and CIOs need to be aware of.
Security and Marketing: A Match Made In Heaven?February 14, 2014
WIRED | In your traditional boardroom there’s precious little love lost between security and marketing. Your CSO and your CMO sit at opposite ends of the compatibility scale. Security is only happy when the barriers are up, and every online user is authenticated up to the hilt, at every new account registration, new transaction, new device or new location.
How a Single Username Puts Your Security at RiskFebruary 7, 2014
Tom's Guide | In the theme song for the old television sitcom "Cheers," the Boston bar was the place where "everybody knows your name." To prove it, every time the character Norm walked into the establishment, everyone inside shouted out, "Norm!" But the Internet isn't "Cheers." On the Internet, it's not always advisable to let everyone know your real name.
New Devices. Same Old Security Issues?February 2, 2014
Business 2 Community | Now that the Consumer Electronics Show (CES 2014) is behind us, we’re all in a better position to judge where the market for mobile devices is going, and the implications for security. We may have seen innovative technology by the shedload, but the security issues are still worryingly familiar.
Fierce It Security | By the end of 2016, around 30 percent of enterprises are forecast to choose cloud-based user authentication solutions and a similar percentage of enterprises are expected to use contextual authentication for employee remote access, says Gartner in its last Magic Quadrant for User Authentication report. "Newer authentication methods and vendors continue to emerge, with the most rapid growth occurring within the past decade in response to changing market needs. The greater adoption of user authentication over a wider variety of use cases, the impact of the Nexus of Forces [social, mobile, cloud and information] … and the emergence of innovative authentication methods have all been disruptive," explains Gartner.