article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Byron: I was initially drawn to cybersecurity as a USA TODAY technology reporter assigned to cover Microsoft. Erin: What cybersecurity technologies are you most excited about right now?

article thumbnail

IDIQ Names Industry Veteran Damian Bushnell Chief Product Officer

Identity IQ

Most recently, Bushnell helped oversee the company’s partnership with Bitdefender® Total Security with Premium VPN to add award-winning internet security software to the IdentityIQ suite of benefits. For more than two decades, Bushnell has been a technology and product leader in the consumer credit and identity theft protection industry.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IDIQ Names Industry Veteran Damian Bushnell Chief Product Officer

Identity IQ

Most recently, Bushnell helped oversee the company’s partnership with Bitdefender® Total Security with Premium VPN to add award-winning internet security software to the IdentityIQ suite of benefits. For more than two decades, Bushnell has been a technology and product leader in the consumer credit and identity theft protection industry.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Related: The Internet of Things is just getting started The technology to get rid of passwords is readily available; advances in hardware token and biometric authenticators continue apace. Username and password logins emerged as the go-to way to control access to network servers, business applications and Internet-delivered consumer services.

Passwords 164
article thumbnail

Cloud Computing Trends in 2016

Spinone

As more and more companies move to cloud services to increase productivity and reduce costs, we are seeing a shift in how businesses are working with digital technologies and their needs and requirements are also changing to fit these new ways of working. Certain industries have a higher adoption level of cloud services.

article thumbnail

Evolution of JSWorm ransomware

SecureList

There is evidence of an initial breach via exploitation of vulnerable server-side software (Citrix ADC) and unsecure RDP access. Energy and Utilities (10%), Finance (10%), Professional and Consumer Services (10%), Transportation (7%), and Healthcare (7%) were also at the top of their list. Technical details. Conclusion.

article thumbnail

Ransomware by the numbers: Reassessing the threat’s global impact

SecureList

However, these types of campaigns are becoming less profitable, for potentially several reasons. Given the increasing amount of attention paid to ransomware, security software may have become better at blocking ransomware threats and people are repeatedly encouraged not to pay. Reconnaissance & persistence. Lateral movement.