Posted on 29 September 2011 by Thales
Despite frequent reports of email hacks and enterprise data breaches, the username and password method for authentication is still one of the primary security measures used today. How do we create secure online identities?
Posted on 29 April 2014 by Thales
After collecting publicly available information about worldwide data breaches, the Breach Level Index (BLI) showed that there were over 200 million data records lost or stolen in the first three months of 2014. As our new infographic shows, that means there were over 2 million records lost or stolen every day. That’s 26 records a […]
Posted on 01 May 2014 by Danna Bethlehem
Two-factor authentication can prevent unauthorized access and credential leakage by ensuring that only a validated user is given system access.
Posted on 01 November 2012 by Thales
SplashData has released its list of the 25 worst passwords of 2012, including the usual suspects: ‘password’ (again, staggeringly, at the top of the list), 123456, and abc123. The list is quite similar to the one I discussed last year, albeit with a few arbitrary additions, such as “welcome”, “jesus”, “ninja”, “mustang”, and the ever […]
Posted on 18 November 2014 by Thales
After collecting publicly available information about worldwide data breaches, the Breach Level Index (BLI) showed that there were over 183 million data records lost or stolen from July through September 2014. As our new infographic shows, that means there were nearly 2 million records lost or stolen every day. That’s 23 records a second. Of the […]
Posted on 18 January 2017 by Anina Steele
Who is responsible for consumer data security? Discover how important it is to secure consumer data, explore the findings of the 2016 Data Breaches and Consumer Loyalty Report.