What Is Phishing Resistant MFA and How Can You Implement It?

| | Authentication
Businesses face an ever-expanding array of cyber threats. Phishing, the deceptive practice of tricking individuals into divulging sensitive information, sits prominently at the top. It’s not just about lost data; it’s about ...
DEF CON 31

DEF CON 31 – Mar Williams’ ‘Making The DEF CON 31 Badge’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
AIM vs CIAM

Top 10 CIAM Software Solutions

CIAM is like a guard at the digital gate. It’s not just about creating barriers to prevent unauthorized access to your systems – it’s also about making your online experience smooth and ...

Don’t phish for deals this holiday season

Thanksgiving in the U.S. signals the start of the holiday shopping season, stretching all the... The post Don’t phish for deals this holiday season appeared first on Entrust Blog ...
holiday Microsoft gift card scam

Microsoft: Storm-0539 Group Behind a Surge of Gift Card Scams

With the holiday season well underway, a threat group with a history of gift card scams is ramping up its efforts, according to Microsoft. The vendor’s Threat Intelligence unit wrote in a ...
Security Boulevard
Deception Technology

Deception Tech: The Art of Cyber Counterintelligence

Deception technology is one of the most effective cybersecurity technologies available today. Here's how to use it ...
Security Boulevard
Password Security for the Elderly: Tips and Best Practices

Password Security for the Elderly: Tips and Best Practices

In episode 308, we discuss the often overlooked topic of password management for the elderly. Addressing the commonly held belief that writing down passwords is a bad idea, we discuss the nuances ...
romance scams approval phishing pig butchering

Romance Scammers are Adopting Approval Phishing Tactics

Romance scams are labor-intensive and time-consuming schemes to run. They can be lucrative, pulling in millions in stolen cryptocurrency, but they also can end up going nowhere if the targeted victim becomes ...
Security Boulevard
Goode Intelligence Competitor Observatory

Pioneering the Future of Identity Platforms

| | Identity Verification
In an era dominated by the digital landscape, the importance of digital identities cannot be... The post Pioneering the Future of Identity Platforms appeared first on Entrust Blog ...