The 2019 State of Password and Authentication Security Behaviors Report

January 16, 2019

There are a growing number of security breaches happening daily to both individuals and businesses. As a result, organizations and online services have shifted efforts in recent years to help educate employees and end users on proper password hygiene, two-factor authentication, signs of a phishing scam, and so on. Despite our worsening state of online security, are we becoming more security-minded individuals, and better yet, are we putting it into practice? Ponemon Institute is pleased to present the results of The 2019 State of Password and Authentication Security Behaviors Report, sponsored by Yubico.

Spotlight

Cellebrite

Cellebrite develops advanced mobile data solutions, enabling the extensive use and management of mobile phone data to provide value for two distinct business divisions: mobile lifecycle and mobile forensics. In the mobile forensics division, our mobile device unlocking solutions, as well as data extraction, decoding, analysis and reporting support law enforcement, military, intelligence, corporate security, and eDiscovery agencies in the successful performance of their duties. In the mobile lifecycle division, retailers and operators can offer customers diagnostics, in-store and over-the-web phone-to-phone content transfer, backup, restore and secure device wipe.

OTHER WHITEPAPERS
news image

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

whitePaper | November 2, 2022

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impacted more than the OT environment. New systems allow employees to operate from home and for equipment vendors to connect remotely to the network to maintain production. And as we emerge from the pandemic, organisations are now more cognisant of the advantages of scaling their business and operations beyond their traditional network perimeters than ever before.

Read More
news image

Dell PowerScale OneFS: Security Considerations

whitePaper | December 28, 2022

In the age of Digital Transformation, organizations must adapt to modern data requirements and implement new features for the transformation life cycle. Throughout this process, protecting data is vital as it is an organization’s most valuable asset. This document describes how to maintain an aggressive security posture for a PowerScale OneFS cluster and meet industry security requirements.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

How Healthcare Can Boost Cyber Security and Close Its Defense Gaps

whitePaper | May 22, 2022

Hackers have made healthcare a top target. As a result, the healthcare industry experienced the highest number of ransomware attacks during Q3 2022, with one in 42 healthcare organizations suffering an attack – in spite of an 8 percent drop in ransomware attacks in Q3.

Read More

Spotlight

Cellebrite

Cellebrite develops advanced mobile data solutions, enabling the extensive use and management of mobile phone data to provide value for two distinct business divisions: mobile lifecycle and mobile forensics. In the mobile forensics division, our mobile device unlocking solutions, as well as data extraction, decoding, analysis and reporting support law enforcement, military, intelligence, corporate security, and eDiscovery agencies in the successful performance of their duties. In the mobile lifecycle division, retailers and operators can offer customers diagnostics, in-store and over-the-web phone-to-phone content transfer, backup, restore and secure device wipe.

Events