by Yvette Bohanan | Jul 3, 2024
As scams, ransomware, account takeovers, and old-fashioned data breaches persist in our personal and business lives, we are all pondering how to get ahead in the cat-and-mouse game that global fraud rings seemingly have mastered. With this episode, we’re setting the...
by George Peabody | Jul 24, 2017
The Internet of Things may be a hot topic but its security isn’t hot at all. Up until recently, IoT device manufacturers and buyers haven’t cared much about security, a disinterest that’s led to over one hundred thousand surveillance cameras being...
by George Peabody | Apr 4, 2017
The term identity gets used a lot whenever internet payments and security are discussed. Knowing who we transact with is still the knotty problem. Strong authentication is required. Identity verification is required, too. A means of sharing the fruits of that work...
by George Peabody | Jun 30, 2016
Digital identity is the black hole of the internet. Our online lives simply aren’t protected by a system without strong authentication. Killing the password is Mission One for security professionals because they’re so readily stolen through phishing...
by George Peabody | Oct 12, 2015
Since the first promise to pay was made, knowing who you’re dealing with has been a requirement. Authenticating the identity of a trading partner – a customer, an accountholder, a business or even a computer – is a burden that falls on the one extending...