article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

Consider that PCI-DSS alone has over 250 complex requirements that include things like endpoint protection, password management, anti-virus, border security, data recovery and awareness training. That shift will start happening in the B2B sphere and the cybersecurity industry.

eCommerce 235
article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Supports Business to Business (B2B), Business to Consumer (B2C) and Business to Employee (B2E) activities (e.g., Bolsters Identity and Access Management (IAM) programs and an organization’s overall security posture. Password Vaults, SSO and Virtual Private Networks. provisioning and de-provisioning a single account).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Related: The Internet of Things is just getting started The technology to get rid of passwords is readily available; advances in hardware token and biometric authenticators continue apace. So what’s stopping us from getting rid of passwords altogether? Passwords may have been very effective securing Roman roads.

Passwords 164
article thumbnail

The story of the year: remote work

SecureList

Two drivers of this conflict are not having a separate room for every family member who needs to work from home (26%) and arguments about how much children should use the Internet (33%). Part of the problem is that, when we teach good Internet safety practices, we are typically speaking to active internet users.

Scams 61