The 2019 State of Password and Authentication Security Behaviors Report

January 16, 2019

There are a growing number of security breaches happening daily to both individuals and businesses. As a result, organizations and online services have shifted efforts in recent years to help educate employees and end users on proper password hygiene, two-factor authentication, signs of a phishing scam, and so on. Despite our worsening state of online security, are we becoming more security-minded individuals, and better yet, are we putting it into practice? Ponemon Institute is pleased to present the results of The 2019 State of Password and Authentication Security Behaviors Report, sponsored by Yubico.

Spotlight

The Email Laundry

The Email Laundry focuses on keeping email safe from malware, phishing, spam, and other advanced threats for over 10,000 organizations worldwide. Founded in 2007, The Email Laundry offers industry-leading cloud-based email security, email encryption, archiving, continuity, phishing user training, email banners and signatures, as well as cyber threat intelligence feeds, to keep businesses secure. Using in-house developed algorithms, The Email Laundry protects email using cyber threat intelligence and multi-layered filtering to block spam and malicious emails before they reach users’ inboxes. The Email Laundry makes securing business hassle free and with The Email Laundry continuity and archiving, emails will continue to flow through natural disasters, floods, fires, or any other issues that may bring your server down.

OTHER WHITEPAPERS
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More

Spotlight

The Email Laundry

The Email Laundry focuses on keeping email safe from malware, phishing, spam, and other advanced threats for over 10,000 organizations worldwide. Founded in 2007, The Email Laundry offers industry-leading cloud-based email security, email encryption, archiving, continuity, phishing user training, email banners and signatures, as well as cyber threat intelligence feeds, to keep businesses secure. Using in-house developed algorithms, The Email Laundry protects email using cyber threat intelligence and multi-layered filtering to block spam and malicious emails before they reach users’ inboxes. The Email Laundry makes securing business hassle free and with The Email Laundry continuity and archiving, emails will continue to flow through natural disasters, floods, fires, or any other issues that may bring your server down.

Events