Aligning With NSA’s Cloud Security Guidance: Four Takeaways

Aligning With NSA’s Cloud Security Guidance: Four Takeaways

The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...
Protecting Against Attacks on NTLM Authentication

Protecting Against Attacks on NTLM Authentication

When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
Using Deterministic Security Controls To Stop Generative AI Attacks

Using Deterministic Security Controls To Stop Generative AI Attacks

Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...
authentication, security, systhetic identity fraud, user management CyberArk identity authentication biometricsidentity AMaaS identity fraud authentication Stealthbits

10 Ways to Fortify Authentication Systems

Verifying identity through authentication is a cornerstone of security. Here's how organizations can fortify their authentication systems ...
Security Boulevard
The Future of Digital Security: Passwordless Authentication

The Future of Digital Security: Passwordless Authentication

In an increasingly complex and connected digital world, the security of our personal and corporate data is a constant concern. For decades, passwords have been the cornerstone of authentication in systems and ...
CSO's Guide: Water-Tight Account Security For Your Company

CSO’s Guide: Water-Tight Account Security For Your Company

This essential CSO guide outlines the robust account monitoring, access notifications, multi-factor authentication, deception technology, and user controls crucial for implementing unmatched account security across your organization ...
password, password-based, FIDO Password

Are Passwords Killing Your Customer Experience?

Businesses are striving to create better customer experiences, but reliance on password-based authentication is holding them back ...
Security Boulevard
credential stuffing attack

Jason’s Deli Restaurant Chain Hit by a Credential Stuffing Attack

The personal information of more than 340,000 customers of popular restaurant chain Jason’s Deli may have been victims of a credential stuffing attack, a scheme in which the hacker uses stolen or ...
Security Boulevard
How to Use Context-Based Authentication to Improve Security

How to Use Context-Based Authentication to Improve Security

One of the biggest security weak points for organizations involves their authentication processes. According to Google Cloud’s 2023 Threat Horizons Report, 86% of breaches involve stolen credentials. Our own research found that ...
The Keystone of Modern Authentication in a Zero Trust World part 1 — The Rise of the Smartphone as…

The Keystone of Modern Authentication in a Zero Trust World part 1 — The Rise of the Smartphone as…

The Keystone of Modern Authentication in a Zero Trust World part 1 — The Rise of the Smartphone as a Premier AuthenticatorIn the current digital era, smartphones have established themselves as a pivotal component ...