Authentication

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Fingerprints, Ensurity collaborate to bring innovative solution for Indian cybersecurity market

The companies are working closely to integrate their respective technological strengths to bring the first-of-their-kind smart USB devices to the global markets.

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.

IT leaders ready to embrace GDPR regulation; compliance challenges remain

IT leaders across the globe gear up to achieve compliance with General Data Protection Regulation (GDPR) which is just about to go live. 

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Why securing containers and microservices is a challenge

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

What to do after a data breach: 5 steps to minimize risk

Website database breaches happen, and while there's little you can do to prevent them you can minimize your exposure. Here's what to do.

5 signs you've been hit with an advanced persistent threat

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

The best privacy and security apps for Android

Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.