When it comes to protecting businesses from the growing variety of Office 365 security threats, balancing the benefits of multifactor authentication with user demands for convenience is a fine art.
Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals.
Security researchers discovered two malicious Android apps that leveraged a clever 2FA bypass technique to steal Turkish users' cryptocurrency credentials.
Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.
Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.
To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.
Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.
Spring is just around the corner, which means it's time for CISOs to evaluate their security strategy, eliminate processes that aren't working, and adopt new cybersecurity practices and technologies.
A recent phishing campaign used a fake Google reCAPTCHA as part of its efforts to target Polish bank employees with malware.
Researchers discovered Geodo botnets using a new spam campaign to deliver samples of Qakbot malware.