by Robert Siciliano — speaker, IDTheftSecurity.com
Amazing. With the proliferation of cyber attacks globally, most businesses are ill prepared to deal with one, says research from the Economist Intelligence…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
I'm sure you've heard the news about Heartbleed by now (unless you've been in vacation wonderland taking a tech break). This is a serious vulnerability at the…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
A data breach notification bill, H.B. 224, was recently introduced in the New Mexico legislature. If enacted, it would make New Mexico the 47th state to adopt…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
A deep analysis into security — via security analytics programs — can unveil crucial areas that need to be addressed if a business is serious about reducing…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
A laptop has become standard equipment for the business traveler. But the great convenience of having masses of information at your fingertips while on the…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
First, what is knowledge-based authentication? KBA is an authentication method that asks the user to respond to at least one question whose correct answer only…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
The defenses of a U.S. government agency were defeated by an experimental scam created by security experts. What's especially scary is how easily it was…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
A public cloud service can bring up five risks for a business. Following are descriptions of each of these risks and their solutions.
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
Today, anyone can learn code and understand the ins and outs of the technology we are simultaneously blessed and cursed with. But once you know how all this…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
Whether you are a work-at-home employee, a road warrior, or even a small business, chances are you have data to protect — and so this all pertains to you.
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
Employees expect to use their mobile devices at work, and employers often don't mind because of the cost savings. However, the use of personal smartphones and…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
Chances are good that in the coming year, you will be asked to provide your or a family member's Social Security number at least a few times. And because of…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
For most travelers, finding a reliable Wi-Fi connection is usually a priority. While a mobile 3G/4G hotspot connection satisfies some, it doesn't compare to…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
The Gemalto Contactless Challenge kicked off in the United States on June 10, with two bloggers — from Austin, Texas, and Salt Lake City, Utah, respectively …
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
Buying credit card numbers with high credit limits must be so much easier than going through the hassle of building good credit, applying for credit cards…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
You're on Facebook, LinkedIn and Twitter. You use Gmail, Yahoo, and online banking. You might buy stuff on sites like Amazon and occasionally make purchases…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
If you live in or travel to a country that controls what websites citizens can and cannot view, then you might not have access to sites like Facebook or…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
When getting on a flight that's three to five hours long (or more), many business professionals wrestle with the decision whether to spend the $12.95 for…
read nowby Robert Siciliano — speaker, IDTheftSecurity.com
To understand how protected you are, you need to understand how unprotected free public wireless is.
read now