CONTINUE TO SITE »
or wait 15 seconds

News & Media From Robert Siciliano

Business aren't prepared for cyber attacks, study says

by Robert Siciliano — speaker, IDTheftSecurity.com

Amazing. With the proliferation of cyber attacks globally, most businesses are ill prepared to deal with one, says research from the Economist Intelligence…

read now
Is your account info online safe from Heartbleed? There's a way to find out, and it's free

by Robert Siciliano — speaker, IDTheftSecurity.com

I'm sure you've heard the news about Heartbleed by now (unless you've been in vacation wonderland taking a tech break). This is a serious vulnerability at the…

read now
Data breach legislation: As states step up, will the Fed follow?

by Robert Siciliano — speaker, IDTheftSecurity.com

A data breach notification bill, H.B. 224, was recently introduced in the New Mexico legislature. If enacted, it would make New Mexico the 47th state to adopt…

read now
5 ways to analyze security and reduce threats

by Robert Siciliano — speaker, IDTheftSecurity.com

A deep analysis into security — via security analytics programs — can unveil crucial areas that need to be addressed if a business is serious about reducing…

read now
7 laptop security tips for travelers

by Robert Siciliano — speaker, IDTheftSecurity.com

A laptop has become standard equipment for the business traveler. But the great convenience of having masses of information at your fingertips while on the…

read now
Why multifactor authentication trumps knowledge-based authentication

by Robert Siciliano — speaker, IDTheftSecurity.com

First, what is knowledge-based authentication? KBA is an authentication method that asks the user to respond to at least one question whose correct answer only…

read now
IT guys get suckered in social media exploit

by Robert Siciliano — speaker, IDTheftSecurity.com

The defenses of a U.S. government agency were defeated by an experimental scam created by security experts. What's especially scary is how easily it was…

read now
Risks and solutions in cloud computing

by Robert Siciliano — speaker, IDTheftSecurity.com

A public cloud service can bring up five risks for a business. Following are descriptions of each of these risks and their solutions.

read now
Crack your WiFi password to protect yourself

by Robert Siciliano — speaker, IDTheftSecurity.com

Today, anyone can learn code and understand the ins and outs of the technology we are simultaneously blessed and cursed with. But once you know how all this…

read now
Devising a data security strategy

by Robert Siciliano — speaker, IDTheftSecurity.com

Whether you are a work-at-home employee, a road warrior, or even a small business, chances are you have data to protect — and so this all pertains to you.

read now
Employees put data at risk on WiFi

by Robert Siciliano — speaker, IDTheftSecurity.com

Employees expect to use their mobile devices at work, and employers often don't mind because of the cost savings. However, the use of personal smartphones and…

read now
5 Ways Your Identity is Stolen

by Robert Siciliano — speaker, IDTheftSecurity.com

Chances are good that in the coming year, you will be asked to provide your or a family member's Social Security number at least a few times. And because of…

read now
Beware the 'evil twins' of Wi-Fi

by Robert Siciliano — speaker, IDTheftSecurity.com

For most travelers, finding a reliable Wi-Fi connection is usually a priority. While a mobile 3G/4G hotspot connection satisfies some, it doesn't compare to…

read now
What is 'synthetic' identity theft?

by Robert Siciliano — speaker, IDTheftSecurity.com

Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal…

read now
The Gemalto 'Contactless Challenge' revisited

by Robert Siciliano — speaker, IDTheftSecurity.com

The Gemalto Contactless Challenge kicked off in the United States on June 10, with two bloggers — from Austin, Texas, and Salt Lake City, Utah, respectively …

read now
Security: Credit card fraud

by Robert Siciliano — speaker, IDTheftSecurity.com

Buying credit card numbers with high credit limits must be so much easier than going through the hassle of building good credit, applying for credit cards…

read now
How the 'digital life' affects identity theft and financial loss

by Robert Siciliano — speaker, IDTheftSecurity.com

You're on Facebook, LinkedIn and Twitter. You use Gmail, Yahoo, and online banking. You might buy stuff on sites like Amazon and occasionally make purchases…

read now
What's the difference between using proxy vs. VPN?

by Robert Siciliano — speaker, IDTheftSecurity.com

If you live in or travel to a country that controls what websites citizens can and cannot view, then you might not have access to sites like Facebook or…

read now
Flying the friendly skies of WiFi

by Robert Siciliano — speaker, IDTheftSecurity.com

When getting on a flight that's three to five hours long (or more), many business professionals wrestle with the decision whether to spend the $12.95 for…

read now
How protected is your tablet on Wi-Fi?

by Robert Siciliano — speaker, IDTheftSecurity.com

To understand how protected you are, you need to understand how unprotected free public wireless is.

read now

Showing 1 - 20 of 41



©2025 Networld Media Group, LLC. All rights reserved.
b'S2-NEW'