Joe Stuntz, a former policy lead for the OMB’s cyber and national security unit, said the future of identity management lies in multiple factors.
Source: Rash of data breaches forcing agencies to rethink how they verify employees’ identities
A cybersecurity career-path program can help with talent retention and recruitment.
Source: 8 Steps for Building an IT Security Career Path Program
Apple says all Mac and iOS systems are affected by new side-channel attack vulnerabilities.
Source: Vendors Rush to Issue Security Updates for Meltdown, Spectre Flaws
Rather than scrambling to deal with attacks after the fact, companies need to focus on improving detection capabilities with tools that help them work within data laws, not outside of them.
Source: Uber’s Biggest Mistake: It Wasn’t Paying Ransom
A scanner can identify a vulnerability, but only a deep understanding of cyber exposure will tell you about the seriousness of that risk. Here’s how and why.
Source: The Argument for Risk-Based Security
Insecure devices put your company at jeopardy. Use this checklist to stay safer.
Source: The Internet of (Secure) Things Checklist
Former DHS OIG employee makes an unauthorized copy of PII data of DHS employees and parties involved in DHS OIG investigations.
Source: DHS Discovers Privacy Incident Involving Former Employee
From renewed investment in brick and mortar to a growing appetite for acquisitions, here’s what to expect in the year ahead.
Source: 7 trends that will disrupt and define retail in 2018
Here are the companies, technologies and trends that soared or sank in 2017.
Source: The retail winners and losers of 2017
Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.
Source: Password managers grow up, target business users