On November 30, the International Information Security Day. A celebration that...
CATEGORIES
News
Holidays Fuel Surge Online Phishing Scams
We’ve all been targeted in phishing attacks — fake messages from a seemingly...
How to Communicate the Value of Information Security
Cyber security has always been an unsought goods like, insurance, which is...
Converged Identity and Access Management to manage user access
Converged IAM (Identity and Access Management) unifies disparate physical and logical access control systems to create a singular trusted identity and credential to match rights and access them...
Multifactor Authentication
Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other...
Reducing the attack surface for identities and entitlements in the cloud
The attack surface is the number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data. The smaller the attack surface, the easier it is...
Happy World Password Day! (and why you should care)
Today is World Password Day. Every year on the first Thursday in May World Password Day promotes better password habits. Despite what is going on in the world this might be the most important Password Day there has been. With so many of us working from home our...
The Importance of Trust in Cyber Security
Today’s network-dependent organization faces an array of challenges and threats. Information and its critical role manifest in many different ways and formats, and are subject to countless outlets for distribution and sharing. Organizations find themselves balancing...
Is your Intranet Digital Workplace secure?
Intranets offer more than just avenues for communication within your company. They also present employees with a treasure trove of content and services, enabling them to perform better and become more effective. On the contrary, when employers are forced to deal with...
Most common Security Vulnerabilities
Cybercriminals are constantly seeking to take advantage of your computer security vulnerabilities. The move to remote-first has underlined the increasing reliance on cloud and web technologies while also confirming what the software development world has known for at...