Monday, June 6, 2016

5 trends shaking up multi-factor authentication

FBI: Extortion e-mail, tech support scam-bags turning up the heat

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jun 06, 2016
Featured Image
INSIDER

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage, would make hardware tokens extinct. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

FBI: Extortion e-mail, tech support scam-bags turning up the heat
9-vendor authentication roundup: The good, the bad and the ugly
Enterprises Are Investing in Network Security Analytics
Buyer's Guide to 9 multi-factor authentication products
Human error biggest risk to health IT
FBI/FTC: Watch those e-mails from your "CEO"
DARPA extreme DDOS project transforming network attack mitigation

White Paper: Hewlett Packard Enterprise

Enterprises Reveal Data Security Priorities

The enterprise attack surface continues to expand. Network borders are evaporating as data scatters across cloud, mobile, remote, and partner and other third-party environments. Multiple entry points into the network have appeared, prompting sophisticated data thieves to unite globally and create pro table data-theft businesses. How are companies coping? Read More

Thumbnail Image

FBI: Extortion e-mail, tech support scam-bags turning up the heat

Not that summer time has anything to do with it but the FBI's Internet Crime Complaint Center (IC3) warned that e-mail extortion campaigns and the tedious tech support scams have heated up in recent weeks. Read More

Thumbnail Image

9-vendor authentication roundup: The good, the bad and the ugly

New 'smart' tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift. Read More

Enterprises Are Investing in Network Security Analytics

Dangerous threats and new requirements persuading organizations to collect, process, and analyze more and more network telemetry and threat intelligence Read More

Thumbnail Image

Buyer's Guide to 9 multi-factor authentication products

The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products. Read More

Thumbnail Image

Human error biggest risk to health IT

Military health official warns that cyber hygiene falls short in health IT. Healthcare data breaches have hit more than nine out of 10 organizations in the field. Read More

Thumbnail Image

FBI/FTC: Watch those e-mails from your "CEO"

The FBI says that the so-called business e-mail compromise scam has caused $2.3 billion in losses to 17,642 business and non-profit organizations in the U.S. and other countries since October 2013, with the number of victims nearly tripling since January 2015. Read More

Thumbnail Image

DARPA extreme DDOS project transforming network attack mitigation

Researchers with the Defense Advanced Research Projects Agency (DARPA) have quickly moved to alter the way the military, public and private enterprises protect their networks from high-and low-speed distributed denial-of-service attacks with a program called Extreme DDoS Defense (XD3). Read More

White Paper: Navisite

7 Steps to Developing a Cloud Security Plan

Security concerns are top-of-mind for IT executives in light of highly publicized data breaches at a wide range of leading enterprises and organizations. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 things we love about the new Firefox browser

10 cool connected car features Read More

Most-Read Stories

1. Father's Day 2016 gift ideas for the discerning geek techie
2. Groundbreaking jury verdict finds Utah firms made 117 million illegal telemarketing calls
3. Bloodiest tech industry layoffs of 2016 so far
4. You've been warned: FCC emphasizes that users of authorized wireless gear must obey rules
5. 19 free cloud storage options
6. OpenSwitch finds critical home at Linux Foundation
7. Review: The Dell XPS 13 Developer Edition laptop is nearly perfect
8. 7 free tools every network needs
9. FBI: Extortion e-mail, tech support scam-bags turning up the heat
10. :7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive