More than 80 percent of all data breaches appear to take advantage of stolen or weak password credentials. In this CIOInsight.com article, Brett McDowell discusses the new National Institute of Standards and Technology (NIST) recommendations on “strong passwords” designed to make password creation more secure for everyone.
McDowell explains the three basic types, or levels, of application protection, the vulnerabilities of one-time passcodes (OTPs), and authentication methods the NIST recommends now in light of today’s increasingly sophisticated cyberthreat horizon.
The European Union’s General Data Protection Regulation (GDPR) law, which takes effect on May 25, 2018 – just two months away – imposes a strict set of requirements on how and why companies collect and use the personal data of EU individuals.
For example, this worldwide requirement enables individuals in the EU to limit and control how international businesses collect, process and use their personal information. It allows them to decide what information they share, and it provides individuals with the “right to be forgotten.”
If you currently have EU customer information and don’t comply with the GDPR requirements, you could face fines of €20 million or 4 percent of your global annual revenue, whichever is higher.
If you have EU clients or customers, chances are it will affect you. Read up on GDPR in Adweek this week.
Last month, a bipartisan team in Congress, Dave Trott, D-Michigan and Susan Brooks, R-Indiana, proposed the Internet of Medical Things Resilience Partnership Act. If passed, it will require the Food and Drug Administration to create a working group of cybersecurity experts to recommend voluntary frameworks and guidelines for medical device security.
Cybersecurity is a quickly evolving field, with scads of startups across many categories, from secure communications, predictive intelligence and deception security to IIoT, cyber insurance and investors.
The folks at CBInsights have compiled a clever Periodic Table of companies and categories of service that can give you a quick orientation. The article includes direct links to the leading companies in most of the categories. It’s the 10,000-foot view that is often missing in more narrowly focused articles.
Blockchain technology changes how parties exchange value, and it has practical, efficient, secure benefits for practically every type of industry. This short blog describes its basic benefits in easy-to-understand language.
The Open Web Application Security Project’s (OWASP) Internet of Things Top 10 Project is designed to inform users and security professionals about vulnerabilities in IoT architectures. Here are the top 10 security problems they see and how to prevent them.
The Trump administration is showing a keen interest in blockchain as a technology with the potential to streamline U.S. government operations.
Governor Scott Walker has designated October as Wisconsin’s Cybersecurity Awareness Month. Each week this October, ReadyWisconsin will provide information to help keep everyone in Wisconsin safe from cybercrime.