Who are you? And who decides you’re really you and can be trusted? The answer, and the systems involved, differ in the real world and online. But blockchain technology could make establishing identity and trust much easier for everyone. Here’s how.
The Equifax breach is the latest example of attackers targeting open-source software in the enterprise.
Windows 10 will be supported until Oct. 14, 2025 — unless your computer has a Clover Trail CPU. Then you’re out of luck.
We’re reliving the Visual Basic-spawned bad times of 1999.
It solves a big problem with biometric authentication and opens up some intriguing possibilities.
Organizations can take steps to better protect themselves from future disruptions from ransomware.
Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.
Just when the world seems ready to listen to us, we give it a display of epic bickering.
You’d think that when it made patches pretty much inescapable, Microsoft would have made darn sure those patches were problem-free. But you’d be wrong.
No sophisticated SOC? You can still be pretty sure that you’re aware of anything potentially troublesome.
The nagware announcements are gone, but Microsoft, along with AMD and Intel, has made darn sure you’ll be running Windows 10 and not Windows 7 on the next PC you buy.
Sometimes, security risks are hiding in plain sight.
Given the success of ransomware, we need to look deeper for solutions beyond those mentioned most frequently. Here are are few of these solutions.
The game is getting its players off the couch, which already wasn’t safe from the bad guys.
What is hard to understand is why LinkedIn didn’t feel the need to force password changes until four years after the breach.
The complexity of today’s SOC functions means you probably can’t hire and keep a staff with all the necessary training.
Phishing scams aren’t going away, and the scammers are in fact getting more sophisticated. That means users have to be more cautious than ever.
Windows XP, Microsoft’s once record-beating operating system (OS) has been abandoned for two years. That’s right, two whole years.
Cyberthieves prey on human nature for even more profit.
The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?
Growth often translates into a need for more capital to fuel opportunities. Successful businesses anticipate opportunities and prepare for them. It is therefore important to make sure your finances are in order and you are able to successfully manage your cashflow to facilitate growth.. Read more