There’s been a surge in sophisticated phishing techniques, outlined in Lookout’s research, targeting cryptocurrency platforms and federal agencies like the FCC.
authentication
Discover the top 10 Low-Code/No-Code vulnerabilities and how to secure rapid development environments.
Deepfakes challenge the traditional cybersecurity paradigms. Rob Wood explains how in this Generative AI Digital Summit moment.
EDA delivers numerous benefits in flexibility, scalibility, and responsiveness, but it also carries unique security considerations.
The human factor plays a critical role in endpoint security, and to minimize the risks of insider threats and human error, organizations should focus on educating employees and fostering a culture of security.
The big change of zero trust can be intimidating to some, but security leaders can tailor their communication to make the shift more palatable.
CISOs and CFOs should collaborate to establish clear goals, enumerate data requirements, and identify supporting tools for financial automation projects while effectively managing risk.
The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
Frank Domizio explains how AI is becoming increasingly popular within the realm of cybersecurity, noting the applications of this technology.
Cybersecurity analyst Robert Wood explains how secure defaults save time and energy for engineers and development teams.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.
Security teams should consider these key questions when evaluating identity and access management (IAM) tools.
The embrace of passwordless doesn’t guarantee a future free of data breaches and account compromises but it does introduce a more secure method of authentication for users.