article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Another angle is to target the victim’s backups.

Trends 278
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? If so, you might want to check out a new guide published this week about how businesses can use AI securely. So says the U.K.

article thumbnail

Four questions for a casino InfoSec director

CIO

Recent cyberattacks at MGM Resorts and Caesars Entertainment have put the spotlight on cybersecurity practices at casinos – and the importance of educating employees on social engineering tactics. How has the job of a casino security leader changed as games have become digitalized? Read on for his thoughts on AI, zero trust, and more.

article thumbnail

VU raises $12M to remove cybersecurity friction from digital experiences

TechCrunch

Stranieri, who has worked in the cybersecurity industry for the past 20 years, got the idea for VU in 2007 after spending hours helping his grandmother verify her identity with the Argentinian government in what turned out to be a two-minute process. It’s time for security teams to embrace security data lakes.

Backup 265
article thumbnail

The Importance of Security and Compliance in Enterprise Applications

OTS Solutions

However, as more organizations rely on these applications, the need for enterprise application security and compliance measures is becoming increasingly important. Breaches in security or compliance can result in legal liabilities, reputation damage, and financial losses.

article thumbnail

How to move your two-factor authentication app to a new device

The Parallax

What the design itself does make clear is that when security-minded consumers upgrade their devices, they will have to take a few extra steps to migrate their two-factor authentication apps. The most basic (and least secure) of this method of securing accounts involves sending the one-time code over text message or email.