Two-factor authentication can be difficult in a workplace that doesn't allow smartphones. But it's not impossible It’s hard to overstate…
It’s time for the CA/Browser Forum to focus on the other half of its mandate Let’s have a candid discussion…
With 80% of breaches linked to privileged access credentials, effectively managing and monitoring privileged accounts often means the difference between…
Thanks to USENIX for publishing the USENIX Enigma 2019 outstanding conference videos on their YouTube Channel Permalink
As CCPA is poised to take effect, companies must ensure they don't put personal information in the wrong hands The…
The danger in using biometrics and facial recognition is that they're not always accurate. A recent article in the L.A.…
Data breaches stemming from unauthorized account access continues to grow. Effective security strategies must resist the path of least resistance…
Man-in-the-middle. Man-in-the-browser. IP spoofing. DNS spoofing. They're all part of the happy family of hacks generally known as Man-in-the-middle attacks,…
Organizations often have incomplete views of who is accessing what, when, where and how across multiple applications and systems. Understanding…
Could California Senate Bill 1001 deal a blow to bots? California has certainly taken the lead when it comes to…