A deeper dive into GDPR: Identity and Access Management Posted on 17 October 2017 by Jennifer Dean in Enterprise Security An important part of GDPR addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the… How do we build secure IoT infrastructure? Posted on 22 March 2017 by Didier Benkoel-Adechy in IoT There’s been a lot in the news lately covering security problems related to the IoT. It’s now more important than ever that we ensure a… Consumer data security: Who is responsible? Posted on 18 January 2017 by Anina Steele in Enterprise Security Who is responsible for consumer data security? Discover how important it is to secure consumer data, explore the findings of the 2016 Data Breaches and… It’s the 21st Century and You’re Not Using 2FA? Posted on 07 September 2016 by Mor Ahuvia in Enterprise Security What’s taken Sony so long to add 2FA to its PSN security? Online service providers of all kinds need two-factor authentication. Are you using 2FA? Inside the LinkedIn Breach: 2FA for Social Network Security Posted on 26 May 2016 by Mor Ahuvia in Enterprise Security With data breaches increasing, if two factor authentication can prevent 63% of data breaches, shouldn't social network security make it standard procedure? How to Use Facebook Securely to Protect Corporate Networks Posted on 14 January 2016 by Jennifer Dean in Enterprise Security If you’re one of Facebook’s 1.55 million users, here’s a resolution you should heed if you want to keep yourself and your friends safe: Be… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories EnterpriseEnterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 08/05/18 @ 09:05 Dora How do I go about informing the FCA that I wish to invoke my 'right to be erased' or 'my right to be forgotten'?05/05/18 @ 01:05 Aol Support What can DDL learn from mobile payment adoption? in this post, the writer clearly discusses all things related to the topic. they mentioned the technique how to learn the technology in mobile, I want to know more about this topic from this website.30/04/18 @ 21:04 Anna Great read, and an important one as eSIMs become more available.