Please turn on your JavaScript for this page to function normally.
encryption
Out with the old, in with the new: From VPNs to ZTNA

The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …

Ben King
Hybrid work: How do you secure every identity on your network?

As organizations around the world continue optimizing their hybrid work environments, many are struggling to stay productive without compromising on security. In this …

biohazard
Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk

Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to …

zero
Even the US president wants zero trust: Here’s how to make it a reality

President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively …

password
Most employees reusing personal passwords to protect corporate data

Nearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. …

IoT
A remedial approach to destructive IoT hacks

As of this year, there are more than 10 billion active IoT devices all over the world, many of which are deployed in enterprises. Keeping those devices secure is of the utmost …

biometrics
The evolution of identity-first security

Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN …

insider threat
How to prevent corporate credentials ending up on the dark web

A little over $3,000 — that’s how much stolen corporate network credentials tend to go for on the dark web. Although the exact asking price for an individual’s …

passwordless
Turning the tide on surging account takeovers in the media industry

Account takeovers (ATOs) are on the rise, fueled by the widespread use of automated bots. The media industry, which includes social networks, content streaming, gambling, …

identity
Consumer attitudes towards various digital identity authentication methods

With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from …

fake
Combating deepfakes: How we can future-proof our biometric identities

How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are …

mobile devices
Most financial services mobile apps still rely on passwords, even with added friction

Incognia announced a report which highlights results from their most recent study focusing on authentication and friction at login and the password reset process. The study …

Don't miss

Cybersecurity news