Please turn on your JavaScript for this page to function normally.
hole
How to contain a privileged access breach and make sure it doesn’t happen again

When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …

passwordless
The importance of balancing security requirements and employee user experience

LastPass released the findings of an IDC survey which revealed that “balancing company security requirements and the employee user experience” is the number one identity …

lock
How to ease password pains while maintaining security

As much as any industry, healthcare must deal with a security landscape that is fraught with challenges and tensions. Health delivery organizations (HDOs) operate under …

account
Organizations failing to give users the login experience they want

Companies often claim to be customer-centric, or even customer-obsessed, striving to offer technologies that their users demand. However, the findings of a recent global Auth0 …

application
SaaS applications investment growing despite underutilization of app licenses by employees

Business investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only …

face
Previous employees with access to corporate data remain a threat to businesses

Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to …

Phishing
Phishing attacks increase in H1 2021, sharp jump in crypto attacks

Overall, the first half of 2021 shows a 22 percent increase in the volume of phishing attacks over the same time period last year, PhishLabs reveals. Notably, however, …

vault
How to secure data one firewall at a time

The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to …

code
A leadership guide for mitigating security risks with low code platforms

The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The …

passwordless
Why passwordless is not always passwordless

The concept of passwordless authentication has been gathering steam. Gartner anticipates that by 2022, 60% of large and global enterprises will implement some sort of …

lock
Password reuse defeats the purpose of passwords

When a person reuses the same password across multiple accounts, one account’s exposure puts all the others at risk. To prevent this, cybersecurity awareness programs must …

password
Imagining a professional life without passwords

Passwords are a source of many security risks, with recent LastPass research revealing IT teams are spending five hours a week on average dealing with password-related issues. …

Don't miss

Cybersecurity news