It’s no secret that, today, the diversity of R&D allows companies to rapidly introduce new applications and push changes to existing ones. But this great complexity...
While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice...
Thursday, May 6 is World Password Day, a day dedicated to promoting safer password practices. Below, security executives share their insight and tips on how to create...
Recently, TalentLMS partnered with Kenna Security to survey 1,200 employees on their cybersecurity habits, knowledge of best practices, and ability to recognize security threats. Here are some of the staggering...
Justin Grudzien says that he sees burnout among his peers in the industry and a lot of it has to do with the pressure that security...
According to Transmit Security’s State of Customer Authentication report, 55% of consumers have stopped using a website because of the login process and more than 87%...
Slack rolled out a new cross-organizational direct messaging feature, and hours later disabled the option to send a message alongside an invite due to concerns that the...
At least 30,000 organizations in the U.S. have been hacked by a Chinese cyber espionage unit, known as “Hafnium.” The group is targeting and exploiting security...
As cybercriminals continue to revel in the surge of employees using weak or vulnerable methods to remotely access workplace systems, organizations are increasingly looking to boost...
Users of Microsoft Corp. email services are being targeted by a new phishing scam that sends fake messages pretending to be from FedEx Corp. and DHL...
Recent Comments