Going Beyond Authentication – Cyber Security Magazine
User Authentication B2C by Kimberly Biddings, VP of Product, BIO-key International As companies look for multi-factor authentication (MFA) methods to keep them secure they find…
User Authentication B2C by Kimberly Biddings, VP of Product, BIO-key International As companies look for multi-factor authentication (MFA) methods to keep them secure they find…
Virtual training is a type of training that allows employees to learn and train from a remote location. Employees can participate in virtual training programs…
In a global economy that is becoming increasingly interconnected through various technologies, financial institutions rely on third-party companies for vital services such as regulatory compliance,…
Fifteen years ago, I wrote an article entitled “The CSO’s Myopia.” At the time, I aimed to highlight a critical limitation in information security management.…
Thousands and thousands of components go into the assembly of contemporary vehicles. It is impossible for any original equipment manufacturer (OEM) to produce all these…
Amazon Prime Day has become a major shopping event, with 2023 setting a record as customers purchased over 375 million items worldwide, up from 300…
The cybersecurity landscape is a complex and ever-evolving ecosystem. At its core lies a fundamental paradox: the more tools we deploy to protect our digital…
Ransomware attacks remain a significant threat to organizations worldwide, with cybercriminals continuously evolving tactics. Despite long-standing advice from cybersecurity experts against paying ransoms, many businesses…
Having served on the MITRE.org CVE (OVAL) advisory board, I have spent years analyzing vulnerabilities and how they impact global cybersecurity. The challenge has always…
Organizations are continually balancing seamless user experiences and implementing robust defenses against evolving threats. Passwords, as the first line of defense, remain a primary vulnerability,…
With incidences of ransomware on the rise, nobody should even be thinking that an attack is something that couldn’t happen to them, let alone speak…
In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states, ransomware groups, and insider…