multi-factor authentication

Hang up the Phone: MFA’s Insecure Reliance on SMS

It’s hard enough to get people to use multi-factor authentication (MFA)—you know, something you know, you have and you are. Most websites, email accounts and other devices are secured (if at all) ...
Security Boulevard
identity verification

Identity Verification: Is Your Potential Employee Who They Say They Are?

Identity verification has taken on a new urgency for cybersecurity and IT teams in the new era of remote work. Confirming a person’s identity has been important since the advent of data ...
Security Boulevard

The Most Secure RADIUS VPN Authentication Method

Due to the COVID-19 pandemic, more employees are working from home now more than ever before. According to a Stanford study, an incredible 42 percent of the U.S. labor force now works ...
https://lh3.googleusercontent.com/proxy/8qECupKLM_-G38tlKLQ9O6cW-WShm_9qTpVuKdvmlRMhaOxDESKFKwgZkUBJ_fV0FYvHhgnwxvIZletVqc93CrA2eXfg7pjBJqn8D074yQyteRU

Problems Facing IT Departments

No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective ...

A WebLogic Vulnerability Highlights the Path-Based Authorization Dilemma

A WebLogic server vulnerability fixed by the October CPU has come under active exploitation after a Vietnamese language blog post detailed the steps needed to bypass authentication and achieve remote code execution ...
behavioral biometrics

Behavioral Biometrics: People-Friendly Zero Trust

Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...
Security Boulevard

Catch Me If You Can: How to Protect Your Identity in the Modern Era

When Leonardo DiCaprio played famed conman Frank Abagnale, it awakened many in the con experience. In the movie Catch Me If You Can, DiCaprio (as Abagnale) conned flight attendants (pretending to be ...

Defending an Increasingly Blurred Perimeter with ZTNA and SASE

Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...
cybersecurity startups

How Startups Build Effective Cybersecurity Programs

A data breach can spell disaster for a startup. Compliance violation fines can cripple a business, and damage to brand value can result in business irrelevance. So it’s vital to take a ...
Security Boulevard

New Bluetooth Vulnerability

There’s a new unpatched Bluetooth vulnerability: The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is getting ready to pair up with Bluetooth-powered ...