Value Your Customer Data as a Business Asset
Private data is now a very public issue. For the first time…
Digital Risk Management: Why Cyber Security Measures Aren’t Enough
Most companies of scale have cyber security measures in place – software…
Where to Go to Learn About Network Security
The one thought on seemingly every business’s mind is network security. This…
Keeping Big Data Secure: Should You Consider Data Masking?
Big data is a boon to every industry. And as data volumes…
Attackers Find Value in the Master Key to Password Managers
A treasure trove of passwords, plus the keys to unlock multiple accounts…
5 of the Most Common IT Security Mistakes to Watch Out For
Securing the enterprise is no easy task. Every day it seems like…
The Non-Fault in iCloud: Why You Shouldn’t Shut Down Your Account
So, just in case you’ve been under a rock for the last…
A Look at Cyber Security Trends for 2014
We’re now more than halfway through 2014, and as with any year,…
Improving Security on the Internet of Things
Mark Stanislav calls himself a “security evangelist.” Online Tech has previously provided…
Answer to OTP Bypass: Out-of-Band Two-Factor Authentication
Trend Micro’s one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly…