Confessions of a Password Tweaker

Author: 
David Ross

 

I have a confession to make. For over twenty years, I’ve been using the same password for most everything. And the worst part is, I thought I was being smart about it.

Cognitive Dissonance: Americans worry about their online security – while continuing to practice poor password hygiene

Author: 
SecureAuth

 

It’s 2017, and data breaches are occurring at a record pace. It’s no wonder, then, that Americans are becoming increasingly anxious about their online security. Our recent report with Wakefield Research says Americans are much more likely to be concerned with their online personal information being stolen (69 percent) than their wallet being stolen (31 percent).

Yes, your users are reusing their passwords and user IDs. What can you do to protect your organization?

SecureAuth Identity and Access Management Secures Credentials with Adaptive MultiFactor Authentication
Author: 
Jeff Hickman

 

If you’re an IT pro, you’re likely aware of the very real damage that can result from even one user’s credentials being compromised. Once attackers have a foothold in your systems, they can linger for months, steadily increasing their permissions until they find and steal your most valuable data. Many organizations are already working to strengthen their security posture for preventing the misuse of stolen credentials. But one very real risk is typically overlooked:  the social and personal credentials of our end users.

RIP IOCs: How Machine Learning will Revolutionize IT Security - Part II

Author: 
David Ross

 

In my last blog post, I sounded the death knell for indicators of compromise (IOCs) — attributes that implicate an item as being associated with cybercrime. IOCs written for one environment rarely transfer into new environments without lots of false positives and false negatives because what’s abnormal (and therefore an IOC) for one system or user might be completely normal for another user or system, or even for the same user at a different time of day.

RIP IOCs: How Machine Learning will Revolutionize IT Security - Part I

Author: 
David Ross

 

For over a decade, the security industry has relied on indicators of compromise (IOCs) — attributes that implicate an item as being associated with cybercrime — to spot threats. Since anything observable, such as a file name, a checksum, a registry entry or an email subject line, can be an IOC, IOCs are easy to write, share, and use.

What You Need to Know about the Australian Privacy Amendment Bill

Author: 
Danielle Jackson, CISO, SecureAuth

 

Countries around the globe are putting policies in place to strengthen security and protect their citizens and business from cyber attacks. These pushes for new regulations are further proof of the increasing concern around the repercussions of data breaches as new high-profile security incidents continue to make headlines.

Pages