The evolution of two-factor authentication, or 2FA, has seen a move away from methods susceptible to man-in-the-middle attacks, like one-time passcodes...
Category - Security
The modern enterprise is plagued by security threats such as zero-day malware and advanced persistent threats, in which an attacker quietly lurks within...
While an organization’s most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and...
Three topics that are top of mind in the national conversation intersected last week when the Executive Women’s Forum met with members of Congress...
Kaseya spent part of its $500 million in fresh funding on ID Agent, and CEO Fred Voccola said more IT acquisitions will follow in areas such as disaster...
The next generation of mobile networking technology — the highly anticipated 5G — will improve the speed and responsiveness of wireless...
BOSTON — Boston Red Sox scouts often work remotely, watching and recording potential players in action. If a scout’s computer crashes...
Authentication is a process of confirming whether someone or something is actually who or what it claims to be. Demand for multifactor authentication in...
Associate Editorial Director
Symantec CEO Greg Clark unexpectedly resigned from the company Thursday, ending his influential and sometimes tumultuous...
Imagine you are a risk analyst or CISO and have been assigned the task of conducting a cyber and physical security risk assessment of a 30-plus-story...