• Why mobile user authentication is more important than ever

    Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands.

    Craig Mathias800 pointsBadges:
  • identity management (ID management)

    Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established...

    ITKE352,565 pointsBadges:
  • The key to assigning risk values in an IT security risk assessment

    Security expert Michael Cobb offers pointers on how to assign risk values during a security risk assessment.

    searchsecurity21,410 pointsBadges:
  • Spear phishing attack led to ICANN compromise

    Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.

    Brandan1,115 pointsBadges:
  • Home router security vulnerability exposes 12 million devices

    Check Point has uncovered a widespread home router security vulnerability, dubbed Misfortune Cookie, that could allow attackers to gain control over millions of devices.

    Brandan1,115 pointsBadges:
  • How the role of the CISO is changing for better and for worse

    Video: Securicon's Ernie Hayden discusses why new resources make the CISO role easier, but new threats and a brighter spotlight make the role harder than ever.

    ITKE352,565 pointsBadges:
  • Mainframe security best practices for compliance with PCI DSS

    Mainframe security is a largely overlooked topic by QSAs assessing compliance with PCI DSS, but expert Mike Villegas explains why enterprises can't ignore the key security controls to ensure mainframe compliance.

    searchsecurity21,410 pointsBadges:
  • Talking Data: Protecting online data privacy was the big 2014 trend

    This edition of Talking Data looks at the trends of 2014 via our favorite tweets. Among the topics of discussion is the growing interest in protecting data privacy through online services.

    Ed Burns895 pointsBadges:
  • Breach response plan is a must for enterprise security

    As data breaches mount, the C-suite is being pressed to take part in enterprise security. At the MIT Sloan CFO Summit, top financial, legal and security experts imparted advice.

    Nicole Laskowski2,395 pointsBadges:
  • LevelUp CFO shares four tips on digital data safety

    Without enterprise security, mobile payment platform company LevelUp could not stay in business. Here are four components of its security strategy.

    Nicole Laskowski2,395 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following