Syndicated Blog

Authentic8 Blog
News, advice, and research from Authentic8, maker of Silo, the secure remote browser. Authentic8 is redefining how the browser is used to access sensitive web data. Silo, their flagship product, is a cloud-based secure browser. Silo secures access to sens
81% of CIOs and CISOs Defer Critical Updates or Patches

81% of CIOs and CISOs Defer Critical Updates or Patches

New research indicates that eight out of ten CIOs and CISOs refrain from adopting an important security update or patch, due to concerns about the impact it might have on business operations ...
Meet Frankie Keyes, the Most Trusted Expert in Cybersecurity

Meet Frankie Keyes, the Most Trusted Expert in Cybersecurity

Frankie… who? No April Fool’s joke: Francis (“Frankie”) Archibald Keyes, Esquire, a fictitious figure you likely have never heard of, enjoys significantly higher trust among IT professionals than most real-life cybersecurity vendors ...
Financial Services: How to Minimize Vendor Risk Online in One Step

Financial Services: How to Minimize Vendor Risk Online in One Step

Here’s a quick tip for CISOs and compliance officers in banks, credit unions, investment or wealth management firms who worry about cybersecurity threats that emanate from vendors and third-party apps: Disconnect from ...
How to Detect VPN (WebRTC) Leaks

VPN: A Big Misunderstanding?

Most VPN services fail to provide a level of data protection and anonymity that would pass professional-level muster. Part 3 of our VPN miniseries shows how confusion about this 20+ years old ...
How Watering Hole Attacks Target the Financial Sector and Government Agencies

How Watering Hole Attacks Target the Financial Sector and Government Agencies

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance, investment and compliance professionals. These online resources make it easy for attackers to target their ...
VPN for Secure and Private Web Access? Think Again.

VPN for Secure and Private Web Access? Think Again.

| | Cloud Browser, Privacy, security
Many believe a VPN will protect users against online privacy violations and web-borne exploits. But how far can you really trust VPN? ...
VPN & Privacy: What Nobody Told You

VPN & Privacy: What Nobody Told You

Large-scale privacy violations on the web have become commonplace. Social media platforms and app or service providers have been shelling out, some intentionally, others unintentionally, user data to third parties hand over ...
Financial Services: Blindspot Browser

Financial Services: Blindspot Browser

Financial firms that still rely on the locally installed web browser as their primary online tool are exposed to data breaches and compliance violations. Now, many are turning to a compliance-ready cloud ...
Quick Dissections: Collections 2 - 5

Quick Dissections: Collections 2 – 5

You’ve seen the headlines about a loot archive of stolen credentials called "Collection #1" that was leaked online in January. This collection contains 772,904,991 entries, one of the most significant credential leaks ...
Why Your Defender’s Paradigm Isn’t Working Anymore

Why Your Defender’s Paradigm Isn’t Working Anymore

| | Cloud Browser, security
Why does it seem like despite the ever-evolving technology and the billions of dollars being spent on cybersecurity, that the attackers are winning? Well, in two words: they are. Despite our best ...
Loading...