Identity & Access
What Is Phishing Resistant MFA and How Can You Implement It?
Businesses face an ever-expanding array of cyber threats. Phishing, the deceptive practice of tricking individuals into divulging sensitive information, sits prominently at the top. It’s not just about lost data; it’s about ...
DEF CON 31 – Mar Williams’ ‘Making The DEF CON 31 Badge’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
Top 10 CIAM Software Solutions
CIAM is like a guard at the digital gate. It’s not just about creating barriers to prevent unauthorized access to your systems – it’s also about making your online experience smooth and ...
Don’t phish for deals this holiday season
Thanksgiving in the U.S. signals the start of the holiday shopping season, stretching all the... The post Don’t phish for deals this holiday season appeared first on Entrust Blog ...
Microsoft: Storm-0539 Group Behind a Surge of Gift Card Scams
With the holiday season well underway, a threat group with a history of gift card scams is ramping up its efforts, according to Microsoft. The vendor’s Threat Intelligence unit wrote in a ...
Deception Tech: The Art of Cyber Counterintelligence
Deception technology is one of the most effective cybersecurity technologies available today. Here's how to use it ...
Password Security for the Elderly: Tips and Best Practices
In episode 308, we discuss the often overlooked topic of password management for the elderly. Addressing the commonly held belief that writing down passwords is a bad idea, we discuss the nuances ...
Happy New Year: Google Cookie Block Starts Soon, but Fear Remains
2024 almost here: Rollout begins Jan 4, but few trust Google’s motives ...
Romance Scammers are Adopting Approval Phishing Tactics
Romance scams are labor-intensive and time-consuming schemes to run. They can be lucrative, pulling in millions in stolen cryptocurrency, but they also can end up going nowhere if the targeted victim becomes ...
Pioneering the Future of Identity Platforms
In an era dominated by the digital landscape, the importance of digital identities cannot be... The post Pioneering the Future of Identity Platforms appeared first on Entrust Blog ...