Top 5 ways to protect MFA codes

Top 5 ways to protect MFA codes

Using SMS for multi-factor authentication is helpful, but not always secure or reliable. What if you lose your phone? Tom Merrittlists five additional ways to receive MFA codes, without SMS. Someone wrote in, after seeing my Top 5 about avoiding using SMS for multi-factor authentication, and asked, “Do you have any suggestions on how to protect myself from getting locked out of my accounts if my phone disappears or dies?” Great question. One advantage of…

Read More

To Share, Or Not to Share – Cyber Defense Magazine

To Share, Or Not to Share – Cyber Defense Magazine

As consumers’ views on personal data evolve, it’s time to re-think data privacy By Kris Lovejoy, Global Consulting Cybersecurity Leader, EY Today organizations are standing at a crossroads when it comes to data privacy. In one direction, a series of high-profile data breaches and scandals in recent years has eroded consumers’ trust in organizations and led to them becoming ever more vigilant about their privacy. This consumer vigilance, combined with a regulatory drive to tighten…

Read More

Docker Captain Take 5 – Gianluca Arbezzano – Docker Blog

Docker Captain Take 5 – Gianluca Arbezzano – Docker Blog

Docker Captains are select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others. “Docker Captains Take 5” is a regular blog series where we get a closer look at our Captains and ask them the same broad set of questions ranging from what their best Docker tip is to whether they prefer cats or dogs (personally, we like whales and turtles over here)….

Read More

How to create a good privacy policy for your website: Tips from the Better Business Bureau

How to create a good privacy policy for your website: Tips from the Better Business Bureau

The BBB provides recommendations on what to include in your business website’s privacy policy. Image: Getty Images/iStockphoto The Better Business Bureau (BBB) has a novel idea: Write an understandable privacy policy for business websites and don’t hide the document on the last webpage in barely readable print. That said, first things first–from the BBB article BBB Tip: Writing an Effective Privacy Policy for Your Business’ Website: “Whether you are processing credit-card payments, saving shipping or…

Read More

Privacy in 2020 and What to Expect for the Year Ahead

Privacy in 2020 and What to Expect for the Year Ahead

2020 was dominated by news of the pandemic and anchored by reality that we all found ourselves in – entire families logging in remotely, trying to keep school and work feeling “normal.” While we tested the limits of what a home office could sustain, the privacy and security of a fully remote world was put front and center. In this piece, we take a look at a few privacy highlights that will likely impact your business…

Read More

Database Server – Don’t Let Your Stored Procedures Lack Integrity

Database Server – Don’t Let Your Stored Procedures Lack Integrity

Unfamiliar territory As a security analyst, engineer, or CISO, there are so many aspects of the field that require immediate attention that one cannot possibly know everything.  Some of the common areas of security knowledge include topics such as where to place a firewall, configuration and patch management, physical and logical security, and legal and regulatory concerns.  However, learning about an unfamiliar topic can not only serve to enhance your awareness, giving you another tool…

Read More

5 tips to weather the winter staffing storm and build a dynamic and flexible bench of reserve staff

5 tips to weather the winter staffing storm and build a dynamic and flexible bench of reserve staff

5 tips to weather the winter staffing storm and build a dynamic and flexible bench of reserve staff | 2020-12-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit…

Read More

G4S publishes Asia Emerging Risks Report 2020

G4S publishes Asia Emerging Risks Report 2020

G4S publishes Asia Emerging Risks Report 2020 | 2020-12-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

3 myths that can derail your machine learning program

3 myths that can derail your machine learning program

3 myths that can derail your machine learning program | 2020-12-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Data privacy expectations in 2021: Trends to watch

Data privacy expectations in 2021: Trends to watch

Data privacy expectations in 2021: Trends to watch | 2020-12-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2,452 2,453 2,454 2,455 2,456 2,541