Enterprise organizations around the world are adapting to work from anywhere (WFA) models. The challenge of securing WFA environments could be solved by biometric authentication.
You must’ve heard it dozens of times by now: passwords are not secure enough to protect business data. But everyone mentions alternatives to passwords as if uprooting your current identity authentication system is a piece of cake.
As organizations shift to permanent hybrid work environments, security leaders must weigh the benefits and challenges of a Bring Your Own Device (BYOD) model.
Jeffrey Feinstein, Vice President of Global Analytic Strategy, LexisNexis Risk Solutions, had the honor of serving on a Federal Reserve committee this past winter to define synthetic identity fraud. The result of this effort was the release of a paper that defines it for the industry, an essential step forward in the fight against this pervasive threat.
Incidents tend to happen at the seams and cracks of your organization, where the automation is incomplete, observability is not omniscient, and humans are still in the loop. Our blind spots are constantly evolving, and we must update our mental models of how to approach security accordingly.
Trust is the ultimate business enabler. When enterprises inspire trust in all their stakeholders, they create a platform for better business performance. But not all brands are starting from a level playing field, says Emily Frolick, KPMG’s Partner, IT Audit and Assurance.
In a world replete with endless cyberattacks, IoT devices have minimal security, in part because cybersecurity stewards and their bosses are busy with other things and aren’t demanding improvement.
The latest and greatest technology will not always protect a company. Instead, focus on the basics of cybersecurity: leadership, training and security monitoring, says Claudia Rast, Practice Department Chair for the IP, Cyber and Emerging Technology Group for Butzel Long.
Cyberattacks are distinct from other types of corporate crises, especially in how, when and why an organization communicates with its stakeholders during and in the aftermath of an attack. Here are five questions boards should ask the C-suite before a cyberattack occurs.