Security in Plain English: How does Anti-Malware Work?

Author: 
Mike Talon | @miketalonNYC

 

This week's user-submitted question: "My company has made anti-virus software mandatory on all machines, including my home machine since I access email on it. How does this software work, and will it impact my machine? Why is it necessary when there are built-in tools?"

BEC and Phishing Threats are Increasing: Are You Protected?

Author: 
SecureAuth + Core Security

 

The 2018 Telstra Security Report uses data from more than 1,250 decision-makers globally to present a view into the most prevalent and pervasive types of security threat and recommend ways to combat them.

3 Steps for Balancing Security and Productivity

Author: 
SecureAuth + Core Security

 

Most organizations are having a tough time striking a balance between maintaining the strong security they require and giving employees the freedom and flexibility they need to excel at their jobs. For example, allowing users to log in from their mobile devices ensures they can work from anywhere — but opens more doors to the corporate network that attackers could exploit. Conversely, requiring complex passwords and two-factor authentication for every log-on strengthens security — but frustrates users and disrupts critical business workflows.

4 Key Takeaways from RSA Conference 2018

Author: 
SecureAuth + Core Security

 

Each year, the RSA Conference brings together top information security experts to discuss critical cybersecurity issues. I hope you got the chance to attend! I found it both fun and enlightening, and I wanted to share my top four takeaways with you.

1. Cybersecurity remains a critical concern for organizations worldwide.

How Does BYOD and Identity Sprawl Together, Impact Your Business?

Author: 
Mike Talon | @miketalonNYC

 

Last week, we discussed the potential problems businesses run into when it comes to identity sprawl. Now, this idea is not limited to just identities, but also the many devices each individual user has and could potentially bring on your network.

How Does Identity Sprawl Impact Your Business?

Author: 
Mike Talon | @miketalonNYC

 

Authentication and GDPR: Covering the Bases

Author: 
SecureAuth + Core Security

 

The European General Data Protection Regulation (GDPR) will take effect on May 18, 2018. The GDPR requires businesses to comply with new rules for collecting, sharing, and protecting personal data within the borders of the European Union (EU) or when exporting information internationally. This applies to any organization that processes personal data of EU citizens, regardless of where that business is located. All companies that do business in Europe will be required to implement a range of security measures.

Symbol-to-Accept: The Newest Innovation in Mobile-Based Authentication

Author: 
Damon Tepe

 

User-friendly Symbol-to-Accept provides the same great user experience as Push-to-Accept while closing critical security gaps

Pages