CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.
Posts Tagged ‘password’
Posted on 31st Oct 2014 by Jennifer Dean in Enterprise Security
Posted on 24th Oct 2014 by Jennifer Dean in Enterprise Security
C-level executives are arguably a business’ most valuable and vulnerable asset. We’ve compiled five tips so you can encourage them to defend themselves when they’re out and about.
Posted on 22nd Oct 2014 by Neville Pattinson in Corporate
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]
Posted on 17th Oct 2014 by Jennifer Dean in Enterprise Security
We believe the executive assistant is among those with the keys to the company’s lifeblood and information, so shouldn’t we be giving them the same level of protection as CxOs?
Posted on 13th Oct 2014 by Jennifer Dean in Enterprise Security
As Episode VII draws closer, we offer some observations for the leadership of the Galactic Empire to note with regard to managing authenticated access and dealing with cyber threats.
Posted on 30th Jul 2014 by Macey Morrison in Enterprise Security
Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has been the monkey on their back they can’t shake. Shadow IT has given businesses something to think about in regards to understanding their full footprint in the cloud as well […]
Posted on 22nd Jul 2014 by Macey Morrison in Enterprise Security
Over at CloudEntr, we love to be loved by our customers (spoiler: we love them back), so we were especially excited to receive a little press from one of our customers AVISIAN Publishing, publishers of more than 10 print and digital publications specializing in the identification technology space. AVISIAN shared the same pain as many of […]
Posted on 28th May 2014 by Ken Abbott in Corporate
I made my first Internet purchase in 1993, a T-shirt for the nascent music-sharing site IUMA (Internet Underground Music Archive). The founders of IUMA, all from the University of California, Santa Cruz, had thought a lot about their venture, and understood many things about the Internet, the law and risk. First of all, IUMA didn’t […]
Posted on 22nd May 2014 by Jennifer Dean in Enterprise Security
It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach. The cybercriminals were able to […]
Posted on 19th May 2014 by Xavier Larduinat in Enterprise Security
A question that many an individual, firm or hacker grapples with. Given the rapid transformation of the digital landscape, it’s only natural that security has evolved at a similar speed, requiring us all to stay abreast of the latest developments and to ensure we have digital security. We believe that digital security is really all […]