Remove Authentication Remove Encryption Remove InfoSec
article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Org Structure. Technology. Regulation.

InfoSec 180
article thumbnail

Authentication is Outdated: A New Approach to Identification

CyberSecurity Insiders

As any infosec manager will tell you, no matter how secure your infrastructure, anyone with the right credentials can walk through the front door. Identity and user authentication continue to be a concern for IT managers. It’s time to take a closer look at alternative identity management and authentication strategies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

Why Free Tools Don’t Cut It While consumer grade and free communication tools like WhatsApp, Telegram, and Signal offer end-to-end encryption, and can help in crises, they do fall short when it comes to enterprise level security and compliance.

article thumbnail

The CPRA: What You Should Know as an InfoSec Professional

SecureWorld News

Endpoint encryption for all laptops. Training for employees (awareness). Privacy training, specifically. Privacy training, specifically. Well documented policies and standards for employees (data handling). Enterprise endpoint protection and remediation (anti-malware, anti-virus software). Intrusion detection and response.

InfoSec 98
article thumbnail

The Clock To Q-Day Is Ticking: InfoSec Global and Thales Provide Collaborative Path to Quantum Readiness

Thales Cloud Protection & Licensing

To counter HNDL, migrating critical systems to Post-Quantum Cryptography (PQC) provides encryption and authentication methods resistant to an attack from a cryptographically relevant quantum computer (CRQC). Encryption Thales | Cloud Protection & Licensing Solutions More About This Author > Schema In the U.S.,

InfoSec 71
article thumbnail

Hackers Could Cause ‘Fake Earthquakes’ by Exploiting Vulnerable Seismic Equipment, Researchers Warn

Hot for Security

Non-encrypted data, insecure protocols and poor user authentication mechanisms are among the security issues that leave seismological networks open to breaches, the authors note.

IoT 128
article thumbnail

OAuth: Your Guide to Industry Authorization and Authentication

eSecurity Planet

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorization purposes. and authentication-focused OpenID Connect (OIDC). Also Read: Passwordless Authentication 101. Not visible to user.