OPINIONS

It's time to find an alternative to multi-factor authentication

It's time to find an alternative to multi-factor authentication

There's no doubt that multi-factor authentication is a strong way to protect your data — and the more factors you need to use to authenticate yourself, the stronger that protection becomes.

For the incoming federal CISO: Focus on the human side of cybersecurity

For the incoming federal CISO: Focus on the human side of cybersecurity

The new federal CISO should be a champion for the role of information security not just in the public sector, but across all walks of American life, from business to school to home.

UK Cyber-security after Brexit: May not be as bad as it first appears

It's difficult to predict how the global and British economies will react to Brexit in the long run, however UK Cyber-security every chance of staying in very good shape says Ilia Kolochenko.

Like pilots, CISOs need a cockpit to manage threats, vulnerabilities, risk

Like pilots, CISOs need a cockpit to manage threats, vulnerabilities, risk

Chief Information Security Officers (CISO) today no longer sit in the IT and security corner doing "techie" things.

Cyber Warfare - Who are you going to call?

Cyber Warfare - Who are you going to call?

If your organization is connected to the Internet, you are very likely engaged in cyber warfare whether you like it or not.

Me and my job: Karthik Rangarajan security engineer, Addepar

Me and my job: Karthik Rangarajan security engineer, Addepar

Me and my job: Karthik Rangarajan security engineer, Addepar

Apple vs. FBI: Too much to ask

Apple vs. FBI: Too much to ask

If Apple complies, the FBI would have the ability to compromise personal security when it wishes, says Ryan O'Leary, VP of Threat Research Center, WhiteHat Security. .

Apple vs. FBI: Comply!

Apple vs. FBI: Comply!

In cases where terrorist attacks are carried out state-side, it is vital that intelligence be obtained, says J.J. Thompson, CEO, Rook Security.

The new age of protection

The new age of protection

Effective detection is comprised of several parts, says Cyphort's Nick Bilogorsiy.

We're off our game

Talk of attack prevention is antiquated, says Illena Armstrong, VP editorial, SC Magazine.

Sign up to our newsletters

TOP COMMENTS