Gaining Visibility and Control of the Dynamic Workforce

Digital transformation and a changing and dynamic workforce can create challenges. This blog discusses some of the typical challenges and suggestions and insight into the control of a remote workforce ...

Renaissance of the OTP hardware token

Multi-factor Authentication is just that ? multi-factor. There are a number of ways to implement MFA including the use of OTP hardware tokens ...

Get RSA SecurID® Access for Free to Help in This Time of Uncertainty

From cyberattacks to natural disasters to outbreaks of illness, business disruptions come in all forms. It?s why RSA is offering new customers the ability to securely extend the convenience of working remotely ...

Zero Trust Approach to Threat Intelligence – BSidesSF Preview

Zero Trust is a security concept that is based on the notion that organizations should not take trust for granted, regardless of whether access attempts originate from inside or outside its perimeters ...

Cyber Security Roundup for January 2020

A roundup of UK focused cyber and information security news stories, blog posts, reports and threat intelligence from the previous calendar month, December 2019.Happy New Year! The final month of the decade ...
Wyze Resets All Users’ Tokens After Learning of Alleged Data Leak

Wyze Resets All Users’ Tokens After Learning of Alleged Data Leak

Wyze implemented a token refresh for all of its users after learning of a security incident that allegedly leaked user data. On December 26, Twelve Security reported that smart home camera provider ...

Start the Year Right with a Security and Privacy Check Up

| | 2fa, cloud api, MFA, Security Awareness, SSH
At some point in the past, I began making new year’s resolutions for doing a bit of personal privacy and security maintenance on New Year’s Day or thereabouts. I would usually have ...

Login Friction: Diminish the Risk, Not the User Experience

The Authentication Situation. How Can Companies Evaluate Risk without Impacting the User Experience? According to Riskified, losses from account takeover increased 122% from 2016 to 2017 and grew by 164% in 2018 ...
yubikey jamf login

Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer ...