J.P. Morgan to utulize biometric-based payments Security Staff March 27, 2023 A new biometric payment system will be rolled out by J.P. Morgan including palm and face identification for payment authentication in-store. Read More
51% of users admit to resetting forgotten passwords once a month Security Staff March 27, 2023 Research highlights current shifts in identity management including passwordless authentication and personally identifiable information ownership.Read More
Ransomware cases saw a 26% year-over-year decline Security Staff March 24, 2023 New research reveals a year of turbulence within the threat actor community due to international conflicts and enhanced attack methods.Read More
Security leaders discuss CISA access management best practices Taelor Sutherland March 24, 2023 The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) has released access management best practices.Read More
What new regulation from the FTC means for businesses Boris Khazin March 24, 2023 Updated FTC regulations mean financial institutions must implement & maintain an information security program with administrative & physical defenses. Read More
48% of security leaders hesitant to adapt to post-quantum algorithms Security Staff March 23, 2023 According to research, the rise of machine identities has created visibility and management challenges for public key infrastructures (PKI).Read More
Report: Top 5 issues facing security industry Security Staff March 23, 2023 A new report reveals that sustainability, mobile IDs and a changing workforce continue to be among the top concerns in the security industry.Read More
Digital fraud surpasses pre-pandemic levels Security Staff March 23, 2023 According to research, the pivot to digital transactions during the pandemic means the risk of digital fraud is greater than it was pre-pandemic. Read More
Being proactive creates a future-proof security strategy Sam Crowther March 23, 2023 Proactive cybersecurity is essential for protecting any organization from potential threats, helping to protect systems, networks & data from attack.Read More
If You Give a Hacker a Storm… Nick Cappi March 22, 2023 Cybercriminals take advantage of misfortunes such as natural disasters. Businesses should plan and prepare to ensure cyber strength during storms. Read More