Passwords: A long goodbye
There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.
There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.
The stated goal of the Cyber Information Sharing Act (CISA), passed by Congress last month as part of an omnibus budget bill, is to improve the security of both the private and public sectors through the sharing of threat information. But opponents maintain it will more likely be used by government to spy on its citizens.
Online extortion and blackmail are not new concepts. But the recent hack of adultery website Ashley Madison shows there is money to be made in threats of personal embarrassment.
One of the best ways to understand your enemy – what he's up to, what his capabilities are and how he can damage you – is to spy on him.
It had to be a bit of a jolt for more than 500 exhibitors and thousands of attendees at RSA Conference 2015 last month, all pushing, promoting and inspecting the latest and greatest in digital security technology: The theme of RSA President Amit Yoran's opening keynote was that they are all stuck in the Dark Ages.
It’s tough to know what the security landscape will look like in six months, never mind a year. But that doesn’t mean it’s not worth trying.
As natural philosopher and onetime baseball catcher Yogi Berra reportedly said: "It's tough to make predictions, especially about the future."
It sounds like the operating system that really needs some serious security patches is the human one.
Relief is in sight for the beleaguered U.S. Payment Card Industry (PCI). By October 2015, chances are that America will no longer have the dubious distinction of leading the world in credit card fraud.
There is a fierce debate about whether GMOs - genetically modified organisms - with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.
Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are.
It is now common knowledge across the information security industry that human weaknesses, not technological flaws, are what put enterprises most at risk from cyber attacks.
Tony Sager has not only witnessed the revolutionary change in cybersecurity over the past several decades – he has lived it, through several decades with the National Security Agency (NSA).
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does.
Everybody from the Federal Trade Commission (FTC) to a unanimous crowd of security experts has been issuing increasingly insistent warnings that security is not being taken seriously in the explosive development of the Internet of Things (IoT).