article thumbnail

Some of tech’s biggest names want a future without passwords — here’s what that would look like via CNBC

IG Guru

The post Some of tech’s biggest names want a future without passwords — here’s what that would look like via CNBC appeared first on IG GURU. Check out the article here.

article thumbnail

14 Ways to Create a Secure Password in 2019 (That you’ll Remember)

IG Guru

There is a mounting requirement to be able to create and safely memorize 100’s of passwords. Over the years, there have been many password tricks that have been invented, such as using a formula or mashing […]. The post 14 Ways to Create a Secure Password in 2019 (That you’ll Remember) appeared first on IG GURU.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Posts on IG GURU in 2019

IG Guru

Security, blockchain, legacy media (tape), leadership, frameworks, and misuse of information continue to be popular topics on IG GURU. 14 ways to create a secure password Popular Information Governance Frameworks and Models What is a hacker? Below are the top posts from 2019.

article thumbnail

LibSSH Flaw Allows Hackers to Take Over Servers Without Password

IG Guru

October 16, 2018Mohit Kumar A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server without requiring a password.

article thumbnail

Hackers leak data on hundreds of German Politicians, including Chancellor Merkel

Security Affairs

” “Personal data and documents belonging to hundreds of politicians and public figures were published on the internet,” government spokeswoman Martina Fietz told reporters. “The government is taking this incident very seriously.” The attack was reported by Parliamentary group leaders late Thursday.

article thumbnail

Respecting Privacy and Data Protection: World Consumer Rights Day

Thales Cloud Protection & Licensing

Some government agencies also leverage CIAM capabilities for government-to-citizen (G2C) identity management. While for-profit businesses may collect information related to transactions and marketing data, non-profits leverage CIAM for secure management of donor, volunteer, and service recipient information.

Privacy 71
article thumbnail

Coronavirus: maintaining GDPR compliance during the COVID-19 pandemic

IT Governance

If staff haven’t changed the default passwords on their routers, they leave themselves open to eavesdropping and man-in-the-middle attacks unless they use a VPN (virtual private network). IT Governance online products and services. Please refer to our COVID-19 policy for more information. Let’s stay secure together.

GDPR 93