Report Recap: Workplace Identity Security Trends and Challenges to Watch in 2024

Report Recap: Workplace Identity Security Trends and Challenges to Watch in 2024

Identity forms the foundation of the modern workplace. Nearly every task depends on the ability to securely access systems using valid digital credentials linked to verified employees. Identity and access management (IAM) ...
Vast USPS Delivery Phishing Campaign Sees Threat Actors Abusing Freemium Dynamic DNS and SaaS Providers

Vast USPS Delivery Phishing Campaign Sees Threat Actors Abusing Freemium Dynamic DNS and SaaS Providers

You may be familiar with the common phishing tactics like fake emails or text messages from a hacker pretending to be someone at your place of work, or maybe it’s someone pretending ...
Insights from SentinelOne's OneCon23

Insights from SentinelOne’s OneCon23

Earlier in the month I had the chance to attend OneCon, SentinelOne’s first ever customer conference in Boca Raton, Florida. This event was a pleasure to be at, not least as the ...

Online Shopping Tips to Protect Yourself During Black Friday 2023

As the holiday season swings into full gear, shoppers are expected to flock to early online shopping deals as part of Black Friday. The great thing is that you don’t need to ...
ICC World Cup 2023: Unmasking the Scams and Threats Targeting Fans Worldwide

ICC World Cup 2023: Unmasking the Scams and Threats Targeting Fans Worldwide

The ICC World Cup 2023, the 13th edition of the ICC Cricket World Cup, is set to take place in India, amidst a rapidly growing digital ecosystem developing around the world. The ...
Five Key Takeaways From the New NSA and CISA IAM Guidance

Five Key Takeaways From the New NSA and CISA IAM Guidance

On October 4, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) jointly released new guidance titled Identity and Access Management: Developer and Vendor Challenges, which addresses ...
Identity Verification vs. Authentication

Identity Verification vs. Authentication

The recent, numerous high-profile attacks targeting identity processes, like those by the Lapsus$ group, underscore the need for strong identity security. New research by the Identity Defined Security Alliance found that 90% ...
Five Things To Know About PCI DSS 4.0 Authentication Requirements

Five Things To Know About PCI DSS 4.0 Authentication Requirements

The Payment Card Industry Security Standards Council recently updated their Data Security Standard (PCI DSS) for protecting payment card data. The latest version, PCI DSS 4.0, introduces more than 60 new or ...
Unpacking the CSRB Report: Lessons from the Lapsus$ Threat Group

Unpacking the CSRB Report: Lessons from the Lapsus$ Threat Group

The global digital ecosystem finds itself facing a new breed of cyber threat actors: loosely organized groups with a penchant for extortion, chaos, and the desire to gain notoriety. The US Department ...
Storm-0558 Microsoft Attack and Adapt

Storm-0558 Microsoft Attack and Adapt

In early July, Microsoft announced Storm-0558 where a Chinese threat actor used forged authentication tokens to access the information – primarily email accounts – of about 25 organizations. This attack included some ...