• img May 10, 2017

SSA.GOV To Require Stronger Authentication

This post was originally published on this siteThe U.S. Social Security Administration will soon require Americans to use stronger authentication when accessing their accounts at ssa.gov. As part of the change, SSA will require all users to enter a username and password in addition to a one-time security code sent their email or phone. In this […]

Read More
  • img May 10, 2017

The Enterprise IoT Security Checklist for Today – and Tomorrow

This post was originally published on this siteEveryone’s worried about securing the Internet of Things (IoT). IoT is poised to create an expansive network of self-driving cars, connected energy grids, and smart appliances. According to Gartner, by the end of 2020, there will be 21B IoT devices worldwide, only expanding our current ecosystem. As companies […]

Read More
  • img May 09, 2017

Emergency Fix for Windows Anti-Malware Flaw Leads May’s Patch Tuesday

This post was originally published on this siteAdobe and Microsoft both issued updates today to fix critical security vulnerabilities in their software. Microsoft actually released an emergency update on Monday just hours ahead of today’s regularly scheduled “Patch Tuesday” (the 2nd Tuesday of each month) to fix a dangerous flaw present in most of Microsoft’s anti-malware technology […]

Read More
  • img May 09, 2017

GDPR: Ignore It at Your Own Risk

This post was originally published on this siteIf your company does business in the European Union, you are likely to face a major overhaul of the way you handle your customer data. That’s because in 2016, the European Parliament passed the EU General Data Protection Regulation (GDPR), a sweeping change that will affect all companies […]

Read More
  • img May 09, 2017

3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

This post was originally published on this siteTo compete in a global marketplacefull of disruptors, organizations are rapidly expanding their reliance on outsourcing, cloud providers and other services that speed up time to market.      But with agility also comes cyber risk. As companies have maintained focus on their own defenses, cyber criminals have realized […]

Read More