0

The Equifax data breach: a case study on how NOT to handle a breach

By now we all have heard and read about the Equifax data breach, that has exposed the personal details and credit record of 143 Million Americans; that’s nearly 44% of the U.S. population. While [...]

1

Miss the “C” Word and be doomed

Secure SDLC in the PCI DSS Ver 3.2 Ambit: “Compliance Management ( the “C” Word) I recently attended a conference where a discussion started on how the PCI DSS Standard meshed [...]

0

WannaLaugh? Bolster your security program in under a dozen steps

Nothing provides better security than a fresh pair of eyes. In a military operation, it is rare to have the same sentry defend a specific military post forever. It’s the same with a cyber [...]

0

The Re-born Identity

One of the goals of digital transformation is making huge amounts of data from across the enterprise available to lots of people across multiple devices, in an easy to view and intuitive format. [...]

1

GDPR: The Power To Control Your Own Personal Data

One of the complaints people sometimes have about regulations is that they get in the way of doing business, even when those regulations are meant to put more power in the hands of government to [...]

0

USAA and Persistent – Not Just Another Risk Based Authentication Service!

Today we announced a really exciting new partnership with USAA. You can read the press release here, and you can read a research note about it by Constellation Research here.  But I’d like to [...]

1

Taking security to the bank – moving money without getting ambushed

When it comes to scientific research, sometimes the debate is, “Just because you CAN doesn’t mean you SHOULD.” In the future, it may be possible to genetically engineer a two-headed combination [...]

0

Where Accessibility Meets Security

A high level of friction is an absolute life-saver when it comes to car brakes, but when dealing with sales, digital interaction and user experience, it brings everything to a grinding halt with [...]

page 1 of 2