article thumbnail

9-vendor authentication roundup: The good, the bad and the ugly

Network World

Due to numerous exploits that have defeated two-factor authentication, either by social engineering, remote access Trojans or various HTML injection techniques, many IT departments now want more than a second factor to protect their most sensitive logins and assets.

article thumbnail

Links for Sept 22 2013

Eric D. Brown

Social media is great for that, because it allows us to be authentic, which is very deeply human. When I interact with the humans in your company who are supported in being authentic, I’m getting a different feeling. It allows us to build relationships, which is very deeply human. Can this affect your brand? Maybe being funny.

Big Data 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Twitter Fined $150 Million for Misuse of 2FA User Data

SecureWorld News

Twitter, like many other social media websites, asks users to provide their phone number and email address to better protect their account. This action violated a 2011 FTC order that prohibited the social media site from misrepresenting its privacy and security practices. Twitter sells 2FA information to advertisers.

Data 88
article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security. In recent years, multiple high-profile, high-impact breaches have raised awareness of the cyber threat.

How To 150
article thumbnail

Security attacks and countermeasures

Cloud Musings

For example, the Target security breach in December, 2013 resulted in hackers accessing 40 million credit card records of customers from every store [2]. Cyber attacks are on the increase, with six of the top 10 largest incidents occurring in 2013 (402M) and 2014 (469M to date) [1]. For example, recent breaches include 3.65

Security 159
article thumbnail

Cloud Musings by Kevin L. Jackson: IBM Debate Series - What's.

Cloud Musings

Thursday, April 25, 2013. Next week I will be participating in the inaugural session of What’s Next in IT Debate Series , a new program of authentic debates and conversations on key technology topics. ▼ 2013. (18). IBM Debate Series - What’s Next in IT? View my complete profile. Top Stories. Blog Archive.

IBM 107
article thumbnail

The Death of Search : spf13.com

SPF13

Social media will be the next innovation in the most unlikely of places, search ( leveraging the community to scale infinitely ). s not that people will all together stop searching, but the approach that they take to finding information will become increasingly social (rather than algorithmic) in nature. Social Media.

Social 100