Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

End user security requires layers of tools and training as employees use more devices and apps

A posting from Dark Reading in there Endpoint security section: When Meritrust Credit Union wanted to improve its endpoint security to comply with financial regulations, information security officer Brian Meyer needed to go beyond antivirus. The commonly used endpoint security typically doesn’t provide a way of tracking whether employees’ devices — the laptops, tablets and […]

LinkedIn flips the two-factor authentication switch

A posting from Naked Security on LinkedIn authentication:  Happy anniversary of getting the bejeezus hacked out of you, LinkedIn! Maybe the timing is just a coincidence, but the career-toned social networking site got savagely hacked on 5 June 2012. Cybercrooks stole about 6.5 million passwords, over 60% of which were cracked within the span of […]

End user security requires layers of tools and training as employees use more devices and apps

A posting from Dark Reading in there Endpoint security section: When Meritrust Credit Union wanted to improve its endpoint security to comply with financial regulations, information security officer Brian Meyer needed to go beyond antivirus. The commonly used endpoint security typically doesn’t provide a way of tracking whether employees’ devices — the laptops, tablets and […]

LinkedIn flips the two-factor authentication switch

A posting from Naked Security on LinkedIn authentication:  Happy anniversary of getting the bejeezus hacked out of you, LinkedIn! Maybe the timing is just a coincidence, but the career-toned social networking site got savagely hacked on 5 June 2012. Cybercrooks stole about 6.5 million passwords, over 60% of which were cracked within the span of […]