Identity Management Comparison

Identity Management Comparison

There’s a new wave of identity management comparison going on these days, and it isn’t in the single sign-on (SSO) or Identity-as-a-Service (IDaaS) market. The hot new area of the IT landscape ...
WiFi Authentication

Definition of WiFi Authentication

Many people take WiFi for granted due to its ubiquity, but that doesn’t change the fact that it is one of the most wide reaching innovations of the modern era. The convenience ...
Cortana Flaw Allows Bypassing Windows 10 Lock Screen

Cortana Flaw Allows Bypassing Windows 10 Lock Screen

Researchers have shown a simple method which could turn out to be a physical type of security risk for victims, using Cortana. Just like Siri, Cortana is enabled by default on all ...
How IDaaS Supports GDPR Article 32

How IDaaS Supports GDPR Article 32

General Data Protection Regulation (GDPR) is one of the most critical privacy and data security compliance requirements that organizations must adhere to right now. GDPR has garnered a great deal of attention ...
3 Key Mobile Enterprise Threats in 2018

3 Key Mobile Enterprise Threats in 2018

As attackers constantly innovate new exploitation and evasion techniques, enterprise security teams are having to stay ahead of a host of emerging threats. Often, these threats have been encountered in other enterprises, ...
High Sierra could not turn on FileVault

High Sierra and FileVault® Compatibility Issues

Many IT admins have been faced with a barrage of issues with managing Mac® users and systems as they have been upgrading their macOS® systems to High Sierra. One such issue is ...
Sextortion Scams Using Redacted Phone Numbers to Demand Payment

Sextortion Scams Using Redacted Phone Numbers to Demand Payment

Sextortion scammers are now using potential targets’ redacted phone numbers in an attempt to trick them into submitting payment. Perhaps after having obtained a list that ties people’s phone numbers and email ...

Hackers attack Instagram | Avast

| | passwords, Security News
Here’s the news #nofilter: thousands of Instagram users are reporting that their accounts were hacked this month, possibly the result of a so-called spam bot attack ...
How to Choose a Password - Computerphile

How to Create a Strong Password and Beat the Hackers | Avast

| | passwords, Privacy, Tips & Advice
Every week, our researchers round up the latest security news and report our findings in these blog pages. If you’ve been reading, you may have noticed a particularly nasty trend claiming new ...
IDaaS and the HIPAA Security Rule

IDaaS and the HIPAA Security Rule

The changing landscape of IT is giving organizations new opportunities to address compliance. One area to consider is IDaaS and the HIPAA Security Rule. The core of any compliance initiative is controlling ...
Loading...