How Customer Engagement Centers Can Boost Security and Compliance
How Customer Engagement Centers Can Boost Security and Compliance juliet.vanwage… Thu, 01/03/2019 - 10:50 Customer engagement centers — customer service hubs that have evolved from call centers into...
View ArticleHow Businesses Can Maximize Cisco’s Identity Service Engine
How Businesses Can Maximize Cisco’s Identity Service Engine juliet.vanwage… Thu, 01/31/2019 - 12:25 No security program is complete without an effective means of identifying would-be network users and...
View ArticleWhy Authentication Needs to Be Simplified for Users and Organizations
Why Authentication Needs to Be Simplified for Users and Organizations Bob.Keaveney_u64t Tue, 02/26/2019 - 17:04 It would be ideal if organizations could implement zero-trust security overnight....
View ArticleA New Kind of YOLO for the Single Sign-On Era
A New Kind of YOLO for the Single Sign-On Era The need for simplicity in user identity authentication and management is constantly butting heads with the need for enhanced, effective security tactics....
View ArticleAs IoT Enhances the Energy Sector, Security Issues Grow
As IoT Enhances the Energy Sector, Security Issues Grow matt.mclaughlin Tue, 04/30/2019 - 12:56 Functions that once required manual labor or onsite supervision are being fully automated as the Internet...
View ArticleGuidelines for Multifactor Authentication in E-Commerce Arrive This Summer
Guidelines for Multifactor Authentication in E-Commerce Arrive This Summer Elizabeth_Neus_pdwC Wed, 05/22/2019 - 13:56 Credit card thieves found it easier to make fraudulent purchases online than in...
View ArticleHow the Energy Sector Can Defend Against DoS Attacks
How the Energy Sector Can Defend Against DoS Attacks matt.mclaughlin Wed, 05/29/2019 - 16:31 In early March, an energy company that provides power to customers in California, Utah and Wyoming was hit...
View ArticleWhat Nonprofits Need to Know About Zero-Trust Security
What Nonprofits Need to Know About Zero-Trust Security phil.goldstein_6191 Thu, 06/27/2019 - 11:05 During the Cold War, the U.S.’s mantra was “trust, but verify.” In the fight against cyberattackers,...
View ArticleWhy Hackers Are Living in a "Candy Store Era"
Why Hackers Are Living in a "Candy Store Era" A growing number of mobile, cloud and digital IT assets have given cyberattackers a vast number of targets. Defending these assets is a challenge, but...
View ArticleBusinesses Deploy MFA as Worker Resistance Declines
Businesses Deploy MFA as Worker Resistance Declines phil.goldstein_6191 Tue, 08/27/2019 - 10:22 When content curation company ProQuest launched in 1938, it had a singular task: to convert newspapers...
View ArticleThe 5 Cybersecurity Must-Haves for Every Business
The 5 Cybersecurity Must-Haves for Every Businesskeara.dowd_bClpWed, 12/04/2019 - 16:49Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every...
View ArticleNRF 2020: How the Cybersecurity Challenge Is Evolving for Retail
NRF 2020: How the Cybersecurity Challenge Is Evolving for RetailCybersecurity is a critical consideration for every industry, and the high-profile data breaches in retail in recent years make security...
View Article
More Pages to Explore .....