Please turn on your JavaScript for this page to function normally.
Tom Wesselman
Combating identity fraud: The key is to avoid stagnation

In this interview with Help Net Security, Tom Wesselman, CTO of TeleSign, explains how to successfully combat identity fraud to not only protect an organization but its …

user
Unused identities: A growing security threat

In early May 2021, Colonial Pipeline, the operator of the pipeline that pumps 45% of the East Coast’s fuel, announced that they had been hacked. In his testimony before the …

shark
Most challenging security threats for CTOs

59% of CTOs still see human error as the main security threat to their business, alongside other prominent concerns such as ransomware (49%) and phishing (36%), a research …

ransomware
Ransomware attacks surge, but victims are recovering quickly

Cymulate announced the results of a survey, revealing that despite the increase in the number of ransomware attacks this past year, overall victims suffered limited damage in …

passwordless
The world’s worst kept secret and the truth behind passwordless technology

One of the biggest security risks of modern-day business is the mass use of passwords as the prime authentication method for different applications. When the technology was …

biometrics
Organizations can save $1.9 million using workforce passwordless authentication

Secret Double Octopus and Ponemon Institute announced the results of a US-based study focused on understanding the state of workforce passwordless authentication, from …

Active Directory
Active Directory control: How adversaries score even bigger goals via attack paths

Microsoft Active Directory and Azure Active Directory are directory services products used for identity and access management at most major enterprises all over the world. All …

Cloud
40% of organizations suffered a cloud-based data breach in the past 12 months

Despite increasing cyberattacks targeting data in the cloud, 83% of businesses are still failing to encrypt half of the sensitive data they store in the cloud, raising even …

idea
The first step to being cybersmart: Just start somewhere

When it comes to a subject as complex as cybersecurity, it’s easy to become a victim of decision paralysis. When company leaders and IT staff begin looking at their options …

encryption
Many organizations lack basic cyber hygiene despite high confidence in their cyber defenses

SpyCloud released an analysis of IT security leaders’ perceived threat of ransomware attacks and the maturity of their cybersecurity defenses. The report found that while 81% …

work from home
WFH is here to stay: Five tactics to improve security for remote teams

When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some …

biometrics
Multi-factor authentications soar as enterprises move away from passwords to secure hybrid workers

Enterprises are taking steps to move away from passwords and adopting low-friction authentication methods to protect the hybrid workforce, a Cisco’s Duo Security report …

Don't miss

Cybersecurity news