biometrics

Beyond MFA: Adding Context For Secure Access

The pandemic forced most businesses globally to transition to remote work. With many people working from home, any semblance of a corporate security perimeter evaporated, increasing demand for virtual private networks (VPNs) ...
Security Boulevard

Cracking Multi-Factor Authentication on the Cheap

| | all posts, MFA, Password
Over the last few years, Multi-Factor Authentication (MFA) use has become more common across industries. Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for ...

Securing AWS Management Configurations By Combating 6 Common Threats

There’s a common misconception that cloud providers handle security, a relic leftover from hosting providers of previous decades. The truth is, cloud providers use a shared responsibility model, leaving a lot of security up ...
zero-day zero-trust app hardware zero-trust prepare

Zero-Trust at Home: No-Exception Remote Work

The zero-trust approach has long been a popular strategy for organizations looking for airtight security in the workplace. By consistently questioning who a user is and what they want to do, we ...
Security Boulevard
Cameyo SolarWinds Double Standard of Reporting Breaches

What’s Scarier Than the SolarWinds Breach?

The recent breach of the SolarWinds Orion platform, in which a sophisticated team of hackers – perhaps affiliated with a nation-state – was able to insert malware into software updates that went ...
Security Boulevard
Apple's Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

In episode 161: Apple will start to proxy Safe Browsing requests to hide IP addresses from Google, the rise of Business Email Compromise attacks, and changes to the free version of LastPass ...
Chrome Password Check

Google Chrome wants to fix your unsafe passwords

Most security breaches are the result of one thing: sloppy password practices. Too many people make the mistake of choosing weak passwords, or reusing passwords that they have used elsewhere on the ...