Passwords: A long goodbye
There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.
There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.
The stated goal of the Cyber Information Sharing Act (CISA), passed by Congress last month as part of an omnibus budget bill, is to improve the security of both the private and public sectors through the sharing of threat information. But opponents maintain it will more likely be used by government to spy on its citizens.
Online extortion and blackmail are not new concepts. But the recent hack of adultery website Ashley Madison shows there is money to be made in threats of personal embarrassment.
One of the best ways to understand your enemy – what he's up to, what his capabilities are and how he can damage you – is to spy on him.
It had to be a bit of a jolt for more than 500 exhibitors and thousands of attendees at RSA Conference 2015 last month, all pushing, promoting and inspecting the latest and greatest in digital security technology: The theme of RSA President Amit Yoran's opening keynote was that they are all stuck in the Dark Ages.
It’s tough to know what the security landscape will look like in six months, never mind a year. But that doesn’t mean it’s not worth trying.
As natural philosopher and onetime baseball catcher Yogi Berra reportedly said: "It's tough to make predictions, especially about the future."
It sounds like the operating system that really needs some serious security patches is the human one.
Relief is in sight for the beleaguered U.S. Payment Card Industry (PCI). By October 2015, chances are that America will no longer have the dubious distinction of leading the world in credit card fraud.
There is a fierce debate about whether GMOs - genetically modified organisms - with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.
Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are.
It is now common knowledge across the information security industry that human weaknesses, not technological flaws, are what put enterprises most at risk from cyber attacks.
Tony Sager has not only witnessed the revolutionary change in cybersecurity over the past several decades – he has lived it, through several decades with the National Security Agency (NSA).
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does.
Everybody from the Federal Trade Commission (FTC) to a unanimous crowd of security experts has been issuing increasingly insistent warnings that security is not being taken seriously in the explosive development of the Internet of Things (IoT).
Join key decision-makers within Environmental, Social, and Governance (ESG) that have the power to affect real change and drive sustainable practices. SustainTech will bridge the gap between ambition and tangible action, promoting strategies that attendees can use in their day-to-day operations within their business.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.
ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO for IBM Australia, Southeast Asia, New Zealand & Korea (ASEANZK)
The roadmap to a low carbon future in technology The IT sector accounts for 2% of global greenhouse gas emissions1. This will rise as data and new technologies increasingly play a central role in shaping organisational operations. As enterprises and governments introduce net zero or decarbonisation targets, IT operations will need to better understand their emissions and how they can be reduced without negatively impacting technology or business operations. SustainTech will bridge the gap between ambition and tangible action, promoting Environmental, Social and Governance (ESG) strategies that attendees can use in their day-to-day operations within their business.
16 November 2023