To develop a strong cyber defense, management needs to have a high-level understanding of what their CISO and IT managers guard against daily.
Posts By Dovell Bonnett
When you implement a smart card project, you must understand what abilities you really have. Don’t circumvent security for marketing hype.
Discover the advantages and disadvantages of how you combine different factors. If you still think a password plus an SMS text code is MFA, you really need to read this article!
Before I can demonstrate the ultimate way to secure passwords and password management, I need to first discuss the truth about MFA.
Authentication factors don’t govern security; the authentication infrastructure determines security. So what’s with all the “killing passwords” talk?
It’s an understatement to say that a data breach is devastating to a company’s future, its employees, its management and its customers. Sadly, it’s the virtual front door often left unsecured and open to everyone that’s the culprit.
In the wake of massive computer advancements, why are humans still the ones being asked to generate, know and reveal passwords?
While almost everyone loves to hate passwords, they are not the real problem.
Why start with password management? Managing passwords is frustrating and often very inconvenient for employees. The hurdles are ridiculous.
Without securing authentication, you allow hackers to steal your intellectual property, steal your money and steal your customers’ personal information.