Richard Biever talks strong authentication, two-factor authentication, YubiKey, user feedback and working with Yubico.
In 0.27 seconds, these were the top headlines that Google pulled from 67,500 results highlighting the latest data breaches around the globe.
- By Ginger Hill
- Sep 01, 2014
A little-known data collecting process by Google can be switched off.
- By Matt Holden
- Aug 29, 2014
These actions will help put you back in control of your child's data.
- By Ginger Hill
- Aug 28, 2014
Non-educators want access to student data to apply principles of big data analysis to it.
- By Ginger Hill
- Aug 27, 2014
Sony Online Entertainment president responds via Twitter to American Airline's plane diversion.
- By Ginger Hill
- Aug 25, 2014
Same malware used in Target attack also targeted more than a thousand other U.S. businesses.
- By Ginger Hill
- Aug 22, 2014
The shipping company found that 51 stores have been hacked
- By Matt Holden
- Aug 22, 2014
Companies called out for jeopardizing the security and privacy of their users.
- By Ginger Hill
- Aug 20, 2014
Community Health Systems in Central Florida hospitals are affected by the breach
- By Matt Holden
- Aug 20, 2014
Internal investigation reveals three breaches in past three years, twice foreign related and once unidentifiable.
- By Ginger Hill
- Aug 19, 2014
The product can be used on Windows, OS X, Android, and iOS
Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.
Movie quotes offer great insights and knowledge to enhance the security industry.
- By Ginger Hill
- Aug 13, 2014
- By Matt Holden
- Aug 12, 2014
Two researchers planned to reveal their findings at Black Hat USA.
- By Matt Holden
- Aug 08, 2014
Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.
The company says it has all the markings of a state-sponsored attack.
- By Matt Holden
- Aug 07, 2014
4 ways to battle this social media giant to beat them at their own game.
- By Ginger Hill
- Aug 06, 2014
Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.
- By Matt Holden
- Aug 06, 2014