As businesses continue to become more global, they decentralize and
externalize non-core business functions, transitioning them to a network of suppliers,
factories, warehouses, transporters, and other value chain stakeholders. The benefits of this are obvious but it leaves your organization more vulnerable to cyber...
Implementing standards for recording demographic data, and also sharing best practices, could help address the challenges involved in matching the right patient with all the right records, a new government study concludes.
Despite increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. However, when a significant percentage of breaches are caused by weak, stolen, or reused passwords, it's clear passwords pose significant risks that can't be...
Despite increased use of two-factor authentication and biometrics, passwords are still the most common form of authentication. However, when most breaches are caused by weak, stolen, or reused passwords, it's clear passwords pose significant risks that can't be ignored.
From potential security breaches to increased...
Card-not-present fraud will cost retailers worldwide $130 billion between 2018 and 2023, a new report from Juniper Research predicts. Steffen Sorrell, author of the study, explains the reasons behind this growth projection and describes what can be done to improve the fight against fraud.
"Self-sovereign identity" projects based on blockchain technology are likely to gain significant momentum in 2019, says analyst Avivah Litan of Gartner Research.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.