More than 50% of organizations are considering a passwordless authentication strategy, according to the 2021 Duo Trusted Access Report. The study, released by Cisco's Duo Security, measured authentication trends across more than 36 million devices.
At the Raines Cybersecurity Leadership webinar, cyber expert Elad Yoran discussed the essential traits of a CISO and why businesses should incorporate a security voice in their boardroom.
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools
October 14, 2021
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.
School budgets have been set for the 2021/2022 school year, policies and procedures have been updated, staffing levels have been established, and security solutions have been deployed into this dynamic environment. Here, we consider adjustments that can be made to deployed controls so that children and school staff remain safe in both hybrid and remote learning environments.
Throughout the past two years, supply chain professionals have experienced the national and international disruptions that can occur as a result of cyberattacks, with some threats completely halting certain sectors.
A new study from BioCatch, the "2021 Fraud Transformation Survey: Detecting and Preventing Emerging Schemes," asked security leaders at global financial institutions about their perceptions of fraud and risk management.
While offering incredible conveniences, mobile apps are also a vehicle for malicious hackers to obtain sensitive data and personal information. But before we dive into the work of hackers, it is important to understand user privacy.
While the appeal of taking action against an attacker is easy to see, private sector hack back is a very bad idea. We encourage organizations to employ active defense techniques, but limit these to assets you own or operate. Hack back raises a number of concerns, as detailed here..