There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.
Stories by Taylor Armerding
It’s tough to know what the security landscape will look like in six months, never mind a year. But that doesn’t mean it’s not worth trying.
It sounds like the operating system that really needs some serious security patches is the human one.
Relief is in sight for the beleaguered U.S. Payment Card Industry (PCI). By October 2015, chances are that America will no longer have the dubious distinction of leading the world in credit card fraud.
There is a fierce debate about whether GMOs - genetically modified organisms - with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.
Most of us would love a break on our health insurance. We would generally appreciate the convenience of seeing ads for things we're actually interested in buying, instead of irrelevant "clutter." A lot of us would like someone, or something, else keeping track of how effective our workouts are.
It is now common knowledge across the information security industry that human weaknesses, not technological flaws, are what put enterprises most at risk from cyber attacks.
Tony Sager has not only witnessed the revolutionary change in cybersecurity over the past several decades – he has lived it, through several decades with the National Security Agency (NSA).
Everybody from the Federal Trade Commission (FTC) to a unanimous crowd of security experts has been issuing increasingly insistent warnings that security is not being taken seriously in the explosive development of the Internet of Things (IoT).
"Information is power," has been true for so long that it has become a cliché.
What's in a name? For one security expert, not enough when the name is "malware."
All threats are not equally threatening.
Big Data does not necessarily mean Good Data. And that, as an increasing number of experts are saying more insistently, means Big Data does not automatically yield good analytics.
Everybody wants a measure of privacy. As some experts on the topic have pointed out, even those who declare they have "nothing to hide" generally have curtains on the windows of their homes and don't invite everybody over to have a look at their credit card statements.
Nominations Close on June 12
VIRTUAL EVENT - Thursday, June 18 - Registrations Open