Hybrid Identity Protection with Denis Ontiveros Merlo

| | General
Security architectures depend on identity—the “new security boundary.” Yet despite investment in identity and attempts to drive a sustainable identity culture, significant security breaches and friction still exist, given competing priorities and ...

Customer onboarding, account opening and electronic signatures: Finding the right balance between security, trust, and convenience.

IDC’s latest forecast makes it clear: The worldwide esignature software market is expected to grow from $2.3 billion in 2020... The post Customer onboarding, account opening and electronic signatures: Finding the right ...
Impersonation Scams: Social Engineering News

Impersonation Scams: Social Engineering News

At Social-Engineer, we define impersonation as the “practice of pretexting as another person with the goal of obtaining information or […] ...
3 Ways for Engineering Leaders to Kickstart a FinOps Program

3 Ways for Engineering Leaders to Kickstart a FinOps Program

| | General
As an engineering leader you need to be BFFs with your CFO. It’s that partnership that gives you a deep understanding of the business - and gives your CFO a view into ...
How to Establish an Effective Information System Security Plan

How to Establish Effective Information System Security Plans

| | Cyber Security, General, risk
Here are 8 steps to create an effective information security plan. Also, learn about the importance and fundamentals of security plans. The post How to Establish Effective Information System Security Plans appeared ...
Sandfield strengthens IT security and automates monitoring with LogRhythm

Sandfield strengthens IT security and automates monitoring with LogRhythm

| | Customers, General
Established in 1989, Sandfield has grown to become a leading provider of software applications for operational businesses looking to differentiate themselves through the use of technology. The company’s services and product portfolio ...
Best ways to Create a Cybersecurity Compliance Plan

Best ways to Create a Cybersecurity Compliance Plan

| | General
To stay ahead of the expanding regulatory requirements, organisations must adopt a security-first approach to cybersecurity in order to prepare for shifting cybersecurity compliance requirements. The post Best ways to Create a ...

Hybrid Identity Protection with Dr. Nestori Synnimaa

| | Active Directory, General
“Every component in your on-prem environment that is part of a hybrid [Active Directory] configuration needs to be treated as a Tier 0 server, so they need to be protected as well ...
typosquatting guide

What is Typosquatting? Learn how to defend against it.

Typosquatting is a form of cybersquatting or domain squatting in which the typo-squatter will register malicious website domain names that are typos or misspellings of popular websites. The post What is Typosquatting? ...

How Cybersecurity Is Evolving from EDR to XDR to Identity

| | General
As businesses continue to embrace hybrid work and digitization, endpoint and identity are moving perpetually closer. Both professions are evolving, and to make the most of this evolution, people on both sides ...