Please turn on your JavaScript for this page to function normally.
hole
How to contain a privileged access breach and make sure it doesn’t happen again

When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …

passwordless
What is fueling the adoption of passwordless authentication?

An identity and access management research report from Enterprise Strategy Group (ESG), finds organizations, frustrated with poor user experience and weak security, are moving …

Voice
Consumers fed up with passwords and KBAs, looking to voice enabled technology as the future

Pindrop released the findings of a survey that explores how 2000+ US-based consumers feel about the future of voice enabled technology and how it will impact their everyday …

passwordless
The importance of balancing security requirements and employee user experience

LastPass released the findings of an IDC survey which revealed that “balancing company security requirements and the employee user experience” is the number one identity …

endpoint protection
Devastating breaches apparently still not enough for organizations to prioritize endpoint security

Action1 released a report based on feedback from 491 IT professionals worldwide. The study explores the extent to which organizations plan to prioritize endpoint security and …

password
MFA market to reach $34.7 billion by 2027

The global multi-factor authentication (MFA) market reached a value of $12.9 billion in 2021, and is expected to reach $34.7 billion by 2027, exhibiting a CAGR of 17.8% during …

passwordless
Traditional MFA is creating a false sense of security

A report from HYPR and Cybersecurity Insiders, reveals that despite the zero trust initiative, many organizations are still highly exposed to credential attacks due to …

account
Microsoft: Enterprise MFA adoption still low

While two-factor authentication usage in the consumer space is climbing quickly, enterprises are still straggling when it comes to using multi-factor authentication (MFA) to …

biometrics
MFA still offers the best chance of keeping data secure

Keyavi Data issued a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA). These best practices explain …

phishing kits
Phishing kits that bypass MFA protection are growing in popularity

The increased use of multi-factor authentication (MFA) has pushed developers of phishing kits to come up with ways to bypass that added account protection measure. A current …

collaboration
How are collaboration apps fairing in remote work environments?

Despite a gradual return to the office, be it on a hybrid or full-time basis, apps and tools that support remote work have continued to experience fast growth, according to …

Microsoft 365
Organizations neglecting Microsoft 365 cybersecurity features

Nearly half of organizations are not using the full set of features and applications available in Microsoft 365, a research from Ensono reveals. Most notably, many enterprises …

Don't miss

Cybersecurity news