Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.
Increased use of cloud applications and other developments are transforming WAN implementations, improving security in the process.
Hackers probably don't look the same way they're portrayed in the media. So, why have the quintessential images of dark, mysterious hackers prevailed?
Most don't think about their telephone system when it comes to securing their network, but VoIP is actually a common vector of attack.
Security information and event management (SIEM) software provides a way to track, integrate, and analyze the vast amount of log data that comes from an organization’s applications and network hardware. Its original value came from compliance reporting, but it is...
An increasingly popular alternative is hiring a managed security service provider (MSSP). What is it and how can it help keep your business secure?
A hardware keylogger can be installed by anyone with access to the space and the nerve to do it.
The decision to use a third-party vendor or not depends on several factors. Regardless, cloud data security is a crucial part of business planning.
Fintech startups are increasingly competing with incumbent banks, insurers, and financial management firms in the areas of lending, payments, financial management, and various forms of insurance.