Do you have strong authentication tools for PCI DSS compliance? Posted on 15 November 2017 by Jennifer Dean in Enterprise Security The deadline to comply with the Payment Card Industry Data Security Standard (PCI DSS) is upon is. Organizations that handle branded credit cards from the… Cyber Insurance: The Challenges Facing Actuaries in Measuring Cyber Risk Posted on 17 October 2017 by David Bisson in Enterprise Security Given the ongoing growth of data breaches around the world, many businesses have already invested in or are looking into cyber insurance. In 2014, the… A deeper dive into GDPR: Identity and Access Management Posted on by Jennifer Dean in Enterprise Security An important part of GDPR addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the… Deloitte data breach demonstrates why MFA and user access controls… Posted on 06 October 2017 by Danna Bethlehem in Enterprise Security With all of the data breaches occurring, you would think that companies would be faster to implement multi-factor authentication and user access controls, but we… Are you ready for DFARS? Posted on 05 October 2017 by Jennifer Dean in Enterprise Security With the Defense Federal Acquisition Regulation Supplement compliance deadline approaching, businesses are scrambling to meet compliance requirements. DFARS addresses the need for strong, two-factor authentication… Yahoo Clarifies that 2013 Hack Compromised All 3 Billion of… Posted on 04 October 2017 by David Bisson in Enterprise Security Yahoo has revised its report of a 2013 security incident by clarifying that the event exposed every one of its three billion user accounts. On… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories cost of a data breachdata breachEnterpriseEnterprise SecurityFinancial ServicesGDPRGDPR Breach NotificationGovernmentidentity and data protectionIoTMobilemulti-factor authenticationPhysical and Logical Accesspkipublic key infrastructureSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 12/12/17 @ 18:12 Sébastien Violette Thanks Ntomboxolo. I'm sure you also have some anecdotes to mention. ;-)02/12/17 @ 05:12 Ntombo @Sebastian . Well put 20years evolution of sim!24/11/17 @ 00:11 Alan Mac The simple facts in life anything created by man women can be un-done by the same the problem with any ANSWER is did you ask the correct question because if the question is wrong then you have the wrong answer ! In cloud and information storage I always find that most people ask the wrong question in search of a correct answer!