A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program. Read More ▶ |
|
| White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | An audit by the Office of Inspector General found U.S. Customs and Border Protection failed to consider the privacy of drone surveillance data, as well as IT security controls. Read More ▶ |
| RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read More ▶ |
| Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read More ▶ |
| | OAuth allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities. Read More ▶ |
| SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs. Read More ▶ |
| Combined with strong encryption such as the Signal protocol, modern mixnets could achieve the Holy Grail: metadata-resistant secure communications. Read More ▶ |
| White Paper: Bronze Drum Consulting Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶ | Editor’s Picks | |
|
|
|