authentication
84% of organizations experienced an identity-related breach in the past 18 months
60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), …
Companies around the globe still not implementing MFA
SMB owners across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small Business …
The importance of secure passwords can’t be emphasized enough
Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the …
Product showcase: Passwork – the best solution for work with corporate passwords
Passwork aims to enable efficient and secure working processes through the automated management of passwords and corporate accounts. Quickly access all employee credentials. …
Popular business web apps fail to implement critical password requirements
Specops Software released new research finding cybersecurity weaknesses in business web apps including Shopify, Zendesk, Trello, and Stack Overflow. Amid a wave of …
54% of SMBs do not implement MFA
SMB owners across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small Business …
Review: Enzoic for Active Directory
Data breaches now happen so often that we don’t even pause when reading yet another headline notifying us of the latest one. We react only if the breach happened to a service …
What are the benefits of passwordless authentication?
In this video for Help Net Security, Christofer Hoff, Chief Secure Technology Officer at LastPass, talks about the benefits of passwordless authentication. The basic …
How tool sprawl is becoming a common issue for SMEs
JumpCloud announced the findings from its Q2 2022 SME IT Trends Report, revealing that while IT teams are successfully managing hybrid-remote work, they are still burdened …
Zero trust adoption: Industry-specific challenges and implementation strategies
Organizations across many industries are in the throes of a journey to implement the zero trust security model to increase their cybersecurity posture. Through my experience …
The future is passwordless. What’s slowing it down?
Ping Identity and Yubico surveyed IT leaders across the globe to determine their appetite for passwordless solutions. Overwhelmingly, the desire was clear to adopt more secure …
Apple unveils passkeys for passwordless authentication to apps and websites
At WWDC 2022, Apple has announced and previewed iOS 16 and iPad OS 16, macOS 13 (aka macOS Ventura), watchOS 9, their new M2 chips, new MacBook Air and Pro, as well as new …
Featured news
Resources
Don't miss
- PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
- Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
- Managing legacy medical devices that can no longer be patched
- Chain of security weaknesses found in smart air compressor model
- Review: The Wireless Cookbook