With Many Employees Working From Home, the Enterprise Attack Surface Has Increased Significantly
Hi, what are you looking for?
With Many Employees Working From Home, the Enterprise Attack Surface Has Increased Significantly
Since the introduction of computers, usernames and passwords have been the primary method used for access control and authentication. However, as post-mortem analysis of...
Under the Current Economic Conditions, Security Professionals Must Quickly Re-assess Their Approach to Defending Against Insider Threats.
The COVID-19 Health Crisis is Forcing Enterprise Security Teams to Deliver More With Less
Static Passwords Are No Longer Enough to Secure Systems
The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even...
Threat actors tend to focus on the human element as the weakest link in the cyber-attack chain, often using stolen, weak, default, or otherwise...
Understanding the Threats, Risks, and Vulnerabilities Associated With Cloud Environments is Critical to Securing Data
For years, cyber security experts have recommended augmenting usernames and passwords with multi-factor authentication (MFA) to add an additional layer of security for access...
Focusing on Data Security Controls Will Not Provide the Most Robust Protection Against Data Breaches
In light of the growing number of mega breaches (e.g., MEGA Collection #1, Dunkin’ Donuts, Citrix) and the ongoing ransomware epidemic, politicians on both...
With the number of data breaches skyrocketing in recent years, global cybercrime-related damages are expected to surge in the years ahead. In the last...