More than 80 percent of all data breaches appear to take advantage of stolen or weak password credentials. In this CIOInsight.com article, Brett McDowell discusses the new National Institute of Standards and Technology (NIST) recommendations on “strong passwords” designed to make password creation more secure for everyone.
McDowell explains the three basic types, or levels, of application protection, the vulnerabilities of one-time passcodes (OTPs), and authentication methods the NIST recommends now in light of today’s increasingly sophisticated cyberthreat horizon.
The European Union’s General Data Protection Regulation (GDPR) law, which takes effect on May 25, 2018 – just two months away – imposes a strict set of requirements on how and why companies collect and use the personal data of EU individuals.
For example, this worldwide requirement enables individuals in the EU to limit and control how international businesses collect, process and use their personal information. It allows them to decide what information they share, and it provides individuals with the “right to be forgotten.”
If you currently have EU customer information and don’t comply with the GDPR requirements, you could face fines of €20 million or 4 percent of your global annual revenue, whichever is higher.
If you have EU clients or customers, chances are it will affect you. Read up on GDPR in Adweek this week.
Cybersecurity is a quickly evolving field, with scads of startups across many categories, from secure communications, predictive intelligence and deception security to IIoT, cyber insurance and investors.
The folks at CBInsights have compiled a clever Periodic Table of companies and categories of service that can give you a quick orientation. The article includes direct links to the leading companies in most of the categories. It’s the 10,000-foot view that is often missing in more narrowly focused articles.
The Open Web Application Security Project’s (OWASP) Internet of Things Top 10 Project is designed to inform users and security professionals about vulnerabilities in IoT architectures. Here are the top 10 security problems they see and how to prevent them.
The Trump administration is showing a keen interest in blockchain as a technology with the potential to streamline U.S. government operations.
Governor Scott Walker has designated October as Wisconsin’s Cybersecurity Awareness Month. Each week this October, ReadyWisconsin will provide information to help keep everyone in Wisconsin safe from cybercrime.
This new series of Accenture Consulting articles describe how Artificial Intelligence is positioned to become the greatest cost, time and labor-saving technology to hit healthcare.
Equifax has been breached twice this year now. Jessica Davis at Healthcare IT News gives us insights into the Equifax response, making mis-steps we can all avoid if we are breached.
The overarching cybersecurity theme of summer 2017 is shaping up to be a widespread infosec talent shortage against the backdrop of fear that arose after the WannaCry ransomware threats happened. Adding to the chaos are predictions that more attacks are not only coming, but will be far worse when they hit.
That scenario is opening doors for managed security services providers, managed detection and response firms and virtual CISOs contracting with hospitals to keep them safe.
There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness.
On April 29, someone hit his employer, IDT Corporation, with two cyberweapons that had been stolen from the National Security Agency. Mr. Ben-Oni, the global chief information officer at IDT, was able to fend them off, but the attack left him distraught.