Privilege is a Security Responsibility

By Ian E. Muller | June 12, 2018
“Rank does not confer privilege or give power. It imposes responsibility.” When it comes to privileged account management, Peter Drucker isn’t wrong. Privileged accounts aren’t about power, they’re about responsibility – mainly the responsibility of protecting them to prevent their abuse by bad actors. Privileged Account Management (PAM) is a headache for security teams everywhere. […]
Read More

From GDPR to Malware: RSA Conference 2018 in a Nutshell

By Ian E. Muller | April 24, 2018
Every year we can mark our calendars in the cybersecurity industry by two events, RSA Conference and Black Hat. Well RSA Conference 2018 has come and gone, and Veridium was there to showcase our new Authenticator App and multi-factor biometric authentication platform. Every year the moods of the vendors shift, with a few overarching themes […]
Read More

New Study Confirms Passwords Are Weakest Link in Security

By Ian E. Muller | April 17, 2018
A day doesn’t go by that we don’t hear about a new data breach. Larger organizations are being targeted, more records are being stolen, and nothing we’re doing is stemming the tide. But at least we know how they happen. According to the 2017 Verizon Data Breach Investigations Report, 81 percent of data breaches were […]
Read More

2017 Was the Worst Year for Data Breaches Yet

By Ian E. Muller | January 23, 2018
2017 was a banner year in cybersecurity for both the right and wrong reasons. We saw an influx of companies embracing stepped-up authentication strategies, including biometric authentication, to enhance security and improve end-user privacy. But we also saw a rise in cyber attacks and severe data breaches. Worst of all, many of the biggest breaches […]
Read More

Hackers Continuing to Exploit RDP Credentials

By Rosa Hargrove | December 7, 2017
Hackers are having one hell of a year. They’re finding more vulnerable points to attack digital enterprises. Even as people implement two-factor authentication to get into their personal accounts, hackers are still managing to successfully access email inboxes, servers, and high-privilege access accounts. But there’s one “classic” entry point that hackers are continuing to exploit: […]
Read More

Cybersecurity in 2018: Drastic Measures for Drastic Times

By James Stickland | December 5, 2017
Many of us were affected by the Equifax data breach, but those of us in the cybersecurity industry were shaken to our core. The fallout of this and other major cyberattacks over the last few years has yet to be fully realized, and the sheer scale of these breaches has caused many enterprise leaders in […]
Read More

Data Breaches Will Cost Us, Here’s the Receipt

By Rosa Hargrove | November 16, 2017
Some experts insist that security breaches in the digital sphere are inevitable. This is a sad thought, particularly coming from an expert, but it’s not unreasonable given companies’ largely lax attitude towards cybersecurity. Companies have shown an unwillingness and/or an inability to adopt the best security practices, even if they’re handling sensitive information. But the […]
Read More

‘Critical’ For a Reason: Cybersecurity and Critical Infrastructure

By Rosa Hargrove | October 31, 2017
Hacking itself isn’t a problem. Disruption is. Sure, breaking into a system isn’t great, but it’s what hackers do once they’re in the system that causes the real problems. Most commonly, they’ll disseminate the information they find or infect the system with malware. Here’s what disruption looks like in that case: Phone calls with banks, […]
Read More

Why You Need to be in Cybersecurity

By Rosa Hargrove | October 26, 2017
We’re all fools. There’s an industry with a 2 percent unemployment rate and a median salary that’s over $80,000. The day-to-day tasks involve protecting people, with the added bonus of minimal risk of bodily harm. But we won’t touch it with a ten-foot pole. This week’s theme for National Cyber Security Awareness Month – Consider […]
Read More

Cybersecurity Ethics: No Choice is Perfect

By Rosa Hargrove | October 24, 2017
You arrive at dinner a little early. The waiter seats you as you wait for your friend. A few minutes later, your friend approaches with a wave and a horrific dress shirt. It’s the kind of shirt that offends all and delights no one.  Do you tell him? Now or later? Do you want to […]
Read More