Silo cybersecurity creates “vulnerability gaps” which hackers exploit How many cybersecurity news articles and blogs have you read about how IT Managers can prevent a cyber-attack on their company’s network? One author promotes Multi-Factor Authentication (MFA) as the...
Did you know: The U.S. Courts have deemed that passwords are protected under the U.S. Constitution? U.S. Courts have ruled that passwords are considered free speech since they are considered “knowledge”. Therefore, under the Bill of Rights, 5th amendment , no person...
Cybersecurity NAICS Codes Lobbying On February 9, 2016, President Obama announced that $19B should be placed in the 2017 budget for cybersecurity. Being a Cybersecurity SMB this seemed like a dream come true, but having already been on the GSA Schedule for almost...
On paper and in theory, asymmetric authentication answers all cybersecurity concerns. But, is not the panacea that all the hype has made us believe. What make asymmetric ciphers “safe” is not the algorithm, key length or patents. It’s the ability to protect the...
Know your Password Manager Last week the cybersecurity industry was a buzz about the Boston-based company LogMeIn, Inc purchasing LastPass for $125M. In the different news articles some interesting facts were quoted: Only 10 percent of knowledge workers today use a...
Every day I read another post, hear another news story, or have another conversation that passwords are insecure and that PKI and digital certificates must replace passwords. Comparing passwords to certificates, or PKI, is not correct because: A passwords is a single...