Zero Trust is a buzzword with which cybersecurity folks are quite familiar. I understand, you’re surprised. Zero Trust has nothing to do with the Amazon packages your spouse hides from you. Rather,...
Long before the COVID-19 pandemic, employees used their work devices to check their social or news notifications while on break. Now, the lines between personal and work uses are even more blurred ...
About Gartner’s 5 Key Predictions for IAM and Fraud Detection
Still today, the number one security problem pertains to identity and passwords.
More than 80 percent of data breaches that have occurred in the last ten years involve brute-force or the utilizati...
About Gartner’s Top Security Projects for 2021
Phishing, smishing, vishing... Outside of haunting CISOs day and night, what’s the difference? Well, phishing can be considered the parent of them all. It involves sending targeted email messages t...
The Bulletproof Solution to Prevent Vishing Attacks
Reality has just caught up with us. The new COVID-19 variants (there seems to be a new one every week since the beginning of the year) is spreading around the world at a worrisome pace. Most wester...
Remote Access Challenges and The Solution
It’s already mid-January and Google has been filled with references to web pages ranking what is supposedly the best to come in 2021 for a multitude of things. Spoiler alert: this blog isn’t about ...
2021 Top-5 Cyber Security Priorities
We’ve all been exposed to social logins. Social logins allow users like you and me to access websites or create accounts on websites by using existing social account credentials that we’ve already ...
Social Logins: The Other Side of The Coin
As much as Bud Fox, under the alias “Blue Horseshoe,” shared his love for Anacott Steel on the phone with a Wall Street reporter with the hope of manipulating the markets, there is one industry tha...
When Fintech and Cyber Attacks Walk Hand in Hand
A second wave of COVID-19 has started to wash across Europe and the United States. So, who knows when there is going to be a return to normality? For the past several months, many organizations hav...
VPN and Virtual Desktop Security Debunked
Employees face a challenge daily, actually multiple times per day, having to access multiple systems and applications throughout the day to do their job. They have to unlock their Windows desktop, ...
Workforce Authentication Challenges and Best Practices
Employees face a challenge on a daily basis, and this challenge consists of having to access multiple systems and applications throughout the day, like unlocking a Windows desktop, logging into int...
Audio Blog: Challenges of Password Management and Best Practices
First we need to see what is mnemonics? It is a system such as a pattern of letters, ideas, or associations which assists in remembering something. A mnemonic private key is a memory technique util...