Phishing Increasingly Targets SaaS, Webmail

How can companies protect their sensitive data and prevent employees from falling prey to phishing attacks? In today’s digital age, virtually every organization must wage a cybersecurity battle to protect its data ...
Security Boulevard
two-factor authentication

Workarounds for Two-Factor Authentication in a Workplace That Isn’t BYOD-Friendly

Two-factor authentication can be difficult in a workplace that doesn’t allow smartphones. But it’s not impossible It’s hard to overstate how dramatically the smartphone has changed our world and our daily lives ...
Security Boulevard
Browser line of death

Online Identity Is Important: Let’s Upgrade Extended Validation

| | ev, identity, Industry Lowdown
It’s time for the CA/Browser Forum to focus on the other half of its mandate Let’s have a candid discussion about Extended Validation SSL. What’s working. What’s NOT. And what... The post ...
privileged access

5 Signs of a Privileged Access Abuser

With 80% of breaches linked to privileged access credentials, effectively managing and monitoring privileged accounts often means the difference between keeping your organization secure and a catastrophic cyber incident. All it takes ...
Security Boulevard
Enigma 2019

USENIX Enigma 2019, Tejas Dharamshi’s ‘Building Identity For An Open Perimeter’

Thanks to USENIX for publishing the USENIX Enigma 2019 outstanding conference videos on their YouTube Channel Permalink ...

Make Digital ID Verification Part of Your CCPA Strategy

As CCPA is poised to take effect, companies must ensure they don’t put personal information in the wrong hands The lines between the digital and physical world are continuing to blur and ...
Security Boulevard
Vendor Management

The Top Vendor Management Processes to Automate

Compliance, security and risk are three reasons why vendor management is becoming a vital task Managing vendor access into your network and systems is becoming a more critical job as news about ...
Security Boulevard

Biometrics, Facial Recognition, Privacy, Security and the Law

The danger in using biometrics and facial recognition is that they’re not always accurate. A recent article in the L.A. Times indicated that facial recognition software proposed to be used for police ...
Security Boulevard

Account Access: Resisting the Path of Least Resistance

Data breaches stemming from unauthorized account access continues to grow. Effective security strategies must resist the path of least resistance Just like doctors and lawyers, cybercriminals are professionals and have a job ...
Security Boulevard
Man-in-the-middle attacks

Stopping Man-in-the-Middle Attacks With Cryptography

Man-in-the-middle. Man-in-the-browser. IP spoofing. DNS spoofing. They’re all part of the happy family of hacks generally known as Man-in-the-middle attacks, wherein a bad actor secretly relays and possibly alters the communication between ...
Security Boulevard