Showing Blog Posts: 1–4 of 4 tagged Password

  • An Anthem to Get Behind: Enable Two-Factor Authentication

    by Eric Cowperthwaite on February 17, 2015

    In the security industry, we all know it’s just a matter of time, sometimes minutes, before the next breach makes headlines. We’re stopping and blocking attacks left and right, and it only takes that one time for a hacker to be right, that one mistake before we have to answer the question, “What happened?” The latest victim was Anthem, a huge health insurance provider who had 80 million customer…

  • The Human Element in the Data Breach

    by Christopher Burgess on November 17, 2014

    We are all familiar with the adage, "to err is human; to really foul things up requires a computer," which implies that the computer may be to blame for many data breach calamities. Alas, it appears the erring human is also culpable. Take, for example, the recent kerfuffle surrounding Apple's iCloud and the compromise of celebrity accounts containing salacious photos. After much slinging of…

  • Gatekeeper: What's New in OS X Mountain Lion Security

    by Ben Rothke on December 10, 2012

    OS X Mountain Lion, Apple’s latest operating system release from July 2012 introduces a number of new security features. For only 99 cents, Gatekeeper: What's New in OS X Mountain Lion Security, available for the Kindle, provides a good overview of these new features. Gatekeeper is an anti-malware feature in OS X and enables users to restrict which external sources they will allow software…

  • Two great lockpicking books from Deviant Ollam

    by Ben Rothke on December 5, 2012

    It is well known that the password, while the most widespread information security mechanism, is also one of the most insecure. It comes down to the fact that the average person can’t create and maintain secure passwords. When it comes to physical locks, the average lock on your home and in your office is equally insecure. How insecure it in? In two fascinating books on the topic, Deviant Ollam…

This document was retrieved from on Mon, 30 Mar 2015 19:01:22 -0400.
© 2015 EMC Corporation. All rights reserved.