A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
Advanced threats are evolving faster than enterprise security, despite record spend. Organizations need an integrated ecosystem of solutions that provide visibility into anomalies and potential risks.
Holiday spending is on the rise both in-store and online. How can retailers ensure PCI compliance to manage large transaction volumes and post-holiday refunds?
Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.
Security researchers discovered that several new malware strains are targeting known Cloudera Hadoop vulnerabilities for bitcoin mining and distributed denial-of-service (DDoS) purposes.
The importance of implementing privileged access management (PAM) is undeniable. But how are organizations doing with actually implementing PAM solutions?
Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?
When building digital identity trust, security teams have historically struggled to find a balance between security and customer convenience. But what if they could have both?
By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.
These days, many electronics companies deploy industrial IoT technologies without evaluating or protecting against cybersecurity risks, or preparing a fast and effective response to a breach.