A deeper dive into GDPR: Identity and Access Management Posted on 17 October 2017 by Jennifer Dean in Enterprise Security An important part of GDPR addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the… How do we build secure IoT infrastructure? Posted on 22 March 2017 by Didier Benkoel-Adechy in IoT There’s been a lot in the news lately covering security problems related to the IoT. It’s now more important than ever that we ensure a… Consumer data security: Who is responsible? Posted on 18 January 2017 by Anina Steele in Enterprise Security Who is responsible for consumer data security? Discover how important it is to secure consumer data, explore the findings of the 2016 Data Breaches and… It’s the 21st Century and You’re Not Using 2FA? Posted on 07 September 2016 by Mor Ahuvia in Enterprise Security What’s taken Sony so long to add 2FA to its PSN security? Online service providers of all kinds need two-factor authentication. Are you using 2FA? Inside the LinkedIn Breach: 2FA for Social Network Security Posted on 26 May 2016 by Mor Ahuvia in Enterprise Security With data breaches increasing, if two factor authentication can prevent 63% of data breaches, shouldn't social network security make it standard procedure? How to Use Facebook Securely to Protect Corporate Networks Posted on 14 January 2016 by Jennifer Dean in Enterprise Security If you’re one of Facebook’s 1.55 million users, here’s a resolution you should heed if you want to keep yourself and your friends safe: Be… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.