Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?
How does Star Trek's information security stack up against current cybersecurity hygiene best practices? Turns out the future's not so bright.
Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.
For the enterprise responsible for protecting customers' PII, should passwords be stored at all — even encrypted?
To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.
Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.
With SSO, employees can use one set of credentials to access all their apps instead of remembering, looking up and frequently resetting multiple passwords.
Let's add the diversity of approach, diversity of values and advocacy for deep customer empathy to the cybersecurity workforce diversity we are building.
Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they'll be used for. We should start preparing for the worst.
A recent phishing campaign used a fake Google reCAPTCHA as part of its efforts to target Polish bank employees with malware.