Authentication

Hang up the Phone: MFA’s Insecure Reliance on SMS

It’s hard enough to get people to use multi-factor authentication (MFA)—you know, something you know, you have and you are.…

3 weeks ago

Identity Verification: Is Your Potential Employee Who They Say They Are?

Identity verification has taken on a new urgency for cybersecurity and IT teams in the new era of remote work.…

4 weeks ago

The Most Secure RADIUS VPN Authentication Method

Due to the COVID-19 pandemic, more employees are working from home now more than ever before. According to a Stanford…

1 month ago

Problems Facing IT Departments

No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network,…

1 month ago

A WebLogic Vulnerability Highlights the Path-Based Authorization Dilemma

A WebLogic server vulnerability fixed by the October CPU has come under active exploitation after a Vietnamese language blog post…

1 month ago

Behavioral Biometrics: People-Friendly Zero Trust

Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very…

1 month ago

Catch Me If You Can: How to Protect Your Identity in the Modern Era

When Leonardo DiCaprio played famed conman Frank Abagnale, it awakened many in the con experience. In the movie Catch Me…

1 month ago

Defending an Increasingly Blurred Perimeter with ZTNA and SASE

Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they…

1 month ago

How Startups Build Effective Cybersecurity Programs

A data breach can spell disaster for a startup. Compliance violation fines can cripple a business, and damage to brand…

2 months ago

New Bluetooth Vulnerability

There’s a new unpatched Bluetooth vulnerability: The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short).…

3 months ago