|
White Paper: Keeper Security This whitepaper discusses the emergence of the password as the primary authentication method in today's digital world and educates readers on authentication techniques, methodologies, technologies and best practices. Read More ▶ |
In honor of Valentine's day, Amazon has discounted various models of Kindle and Fire Tablets, some up to 25% off their regular list price. Other devices and bundles have been discounted as well. These deals run only through February 14. Read More ▶ | |
Small business owners and marketing pros share their tips regarding what ecommerce businesses can do this Feb. 14 to show their customers they care. Read More ▶ | |
Our roundup of intriguing new products from companies such as Fortinet and Flashpoint. Read More ▶ | |
|
iHome's iPL23 is compatible with iPhones 5, 6 and 7 (including Plus models), features premium speakers, a Lightning charging dock, FM radio, and alarm clock in one compact device. Read More ▶ | |
Dizzion provides suggestions for ways vendors can maintain HIPAA compliance while still focusing on their primary business objectives. Read More ▶ | |
Russell Rice, senior director of product management at Skyport Systems, provides some ways IT organizations can keep privileged credentials for Active Directory safe. Read More ▶ | |
The U.K.'s defense secretary is accusing Russia of using cyber attacks to "disable" democratic processes across the West, and he's demanding that NATO fight back. Read More ▶ | |
Sanctions imposed by former President Obama on Russia for hacking during the U.S. election had an unintended side effect: they essentially barred U.S. tech firms from selling new IT products in the country. Read More ▶ | |
Valentine's Day gifts offer a techie alternative to the usual flowers, jewelry and candy. Read More ▶ | |
An anonymized feed of DNS queries, along with anomaly detection and correlation technology, makes it possible to identify suspected domains used by Locky to download encryption keys Read More ▶ | |
Your phone's home screen can get as wild or tame as you want with these customizations. Read More ▶ | |
The internet and smartphones have come up with five new and surprising ways to steal or expose our personal data. These trends make panic sound like a good idea. Read More ▶ | |
In the latest episode of Security Sessions, CSO Editor-in-chief Joan Goodchild speaks with Imad Mouline, CTO at Everbridge, about how involved CSOs need to be with planning for an active shooter or other emergency at their company. While many leave physical security to others in the company, the CSO can be key to determining communications plans for alerting employees. Watch Now ▶ | |
White Paper: Keeper Security Weak passwords are at the heart of the rise in cyber theft, causing 76% of data breaches. To mitigate this risk, businesses are adopting password management solutions. This is a comprehensive password management evaluation guide with recommended security, implementation and productivity requirements. Read More ▶ |
0 comments:
Post a Comment