Privilege is a Security Responsibility

By Ian E. Muller | June 12, 2018
“Rank does not confer privilege or give power. It imposes responsibility.” When it comes to privileged account management, Peter Drucker isn’t wrong. Privileged accounts aren’t about power, they’re about responsibility – mainly the responsibility of protecting them to prevent their abuse by bad actors. Privileged Account Management (PAM) is a headache for security teams everywhere. […]
Read More

What’s Your Data Breach Risk Level?

By Ian E. Muller | June 11, 2018
It seems like we’re talking about a new data breach every other day. From the InterContinental Hotels Group to OneLogin, companies across every industry have been targeted so far in 2017, and we can only expect both the size of, and damaged caused by, these events to grow. The question that organization leadership needs to […]
Read More

Why Do Biometrics Improve Security?

By Ian E. Muller | May 19, 2018
We often discuss the merits of biometric authentication as a way to advance cybersecurity on personal and enterprise levels. But it’s important for you to understand why biometrics offer improvements to security, and what the advantages actually are. No Passwords to Steal Passwords account for 81 percent of data breaches, making them the biggest flaw […]
Read More

From GDPR to Malware: RSA Conference 2018 in a Nutshell

By Ian E. Muller | April 24, 2018
Every year we can mark our calendars in the cybersecurity industry by two events, RSA Conference and Black Hat. Well RSA Conference 2018 has come and gone, and Veridium was there to showcase our new Authenticator App and multi-factor biometric authentication platform. Every year the moods of the vendors shift, with a few overarching themes […]
Read More

New Study Confirms Passwords Are Weakest Link in Security

By Ian E. Muller | April 17, 2018
A day doesn’t go by that we don’t hear about a new data breach. Larger organizations are being targeted, more records are being stolen, and nothing we’re doing is stemming the tide. But at least we know how they happen. According to the 2017 Verizon Data Breach Investigations Report, 81 percent of data breaches were […]
Read More

2017 Was the Worst Year for Data Breaches Yet

By Ian E. Muller | January 23, 2018
2017 was a banner year in cybersecurity for both the right and wrong reasons. We saw an influx of companies embracing stepped-up authentication strategies, including biometric authentication, to enhance security and improve end-user privacy. But we also saw a rise in cyber attacks and severe data breaches. Worst of all, many of the biggest breaches […]
Read More

Hackers Continuing to Exploit RDP Credentials

By Rosa Hargrove | December 7, 2017
Hackers are having one hell of a year. They’re finding more vulnerable points to attack digital enterprises. Even as people implement two-factor authentication to get into their personal accounts, hackers are still managing to successfully access email inboxes, servers, and high-privilege access accounts. But there’s one “classic” entry point that hackers are continuing to exploit: […]
Read More

Cybersecurity in 2018: Drastic Measures for Drastic Times

By James Stickland | December 5, 2017
Many of us were affected by the Equifax data breach, but those of us in the cybersecurity industry were shaken to our core. The fallout of this and other major cyberattacks over the last few years has yet to be fully realized, and the sheer scale of these breaches has caused many enterprise leaders in […]
Read More

Data Breaches Will Cost Us, Here’s the Receipt

By Rosa Hargrove | November 16, 2017
Some experts insist that security breaches in the digital sphere are inevitable. This is a sad thought, particularly coming from an expert, but it’s not unreasonable given companies’ largely lax attitude towards cybersecurity. Companies have shown an unwillingness and/or an inability to adopt the best security practices, even if they’re handling sensitive information. But the […]
Read More

‘Critical’ For a Reason: Cybersecurity and Critical Infrastructure

By Rosa Hargrove | October 31, 2017
Hacking itself isn’t a problem. Disruption is. Sure, breaking into a system isn’t great, but it’s what hackers do once they’re in the system that causes the real problems. Most commonly, they’ll disseminate the information they find or infect the system with malware. Here’s what disruption looks like in that case: Phone calls with banks, […]
Read More