Backdoors Found in Tools Used by Hundreds of Organizations

Many organizations around the world using connectivity tools from NetSarang are at risk after researchers at Kaspersky Lab discovered that malicious actors had planted a backdoor in several of the company’s products. NetSarang, which has offices in the United States and South Korea, specializes in secure connectivity solutions. Some of its most popular products are…

Five Steps to Protect Your Critical Data From Insider Threats

As companies around the world turn their attention to advanced threats endangering their most sensitive data, one category is commanding much-deserved attention: insider threats. With 44.5 percent of attacks perpetrated by malicious insiders, guarding against these incidents is becoming a pressing concern. An effective way to tackle insider threats is with an integrated approach that…

These Were the Most Common Passwords Used in 2016

Although weak and commonly used passwords have long been one of the most used venues to compromise accounts, they remain at the top of the most popular passwords charts, a recent Keeper Security report reveals. Last year’s mega-breaches once again brought to the spotlight the long-lasting issue of weak passwords, but users remained deaf to…

Protecting Your Staff in Co-Working Spaces

Four walls, a sea of cubicles and the rest of the traditional office accoutrements are no longer standard in the working world. The number of innovative co-working spaces continues to rise around the world, and this doesn’t even include coffee shops, libraries and numerous other public places that offer free Wi-Fi. That means that your…

IP Theft: How Often Does Your IP Walk Out the Door?

It happens — employees leave. Sometimes they find growth opportunities and are encouraged, even cheered, by their employers to go for it. Other times, they are let go due to downsizing or performance issues, recruited by rivals or otherwise lured to greener pastures. In all scenarios, the employer’s intellectual property (IP) is at risk. Revenge,…

Access Management Resolution in the Digital Era

There seems to be continuing confusion about what access management means. In layman’s terms, accessing an application implies the process of authentication — i.e., opening a browser or accessing a link — where you may be prompted to enter your credentials. If the user provides the right set of credentials, he or she gains access…

ImageWare Launches Multi-modal Biometric Authentication for Enterprises

Today’s security consensus is that password-based authentication and access is insecure, and that some form of two- or multi-factor authentication is necessary. The simplest and easiest second factor is an SMS-based soft token, and that is the route already adopted by many organizations. However, NIST’s recently published concern over some implementations of SMS-based 2FA has…