Layer Up With a Layered Approach to Email Security This Winter

Email security remains a top priority in 2019 as organizations continue to face the threat of costly email compromise. The

Read more

Can Authentication Negatively Impact the User Experience?

Authentication can sometimes feel like a balancing act. On one hand, securing your digital experience is a top priority. Preserving

Read more

Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

If chief information security officers (CISOs) could wave a magic wand and make one cybersecurity issue vanish, malware would top

Read more

The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication

The initials MFA, as every computer security professional knows, stand for multifactor authentication. The same initials also stand for Master

Read more

Why Cybercriminals Are Targeting Travel and Transportation

Cybercriminals must take vacations sometimes, but right now they are just as likely to be hacking the airline that would

Read more

Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication

Most of us have accepted that passwords are an insecure form of authentication — and, worse still, downright clunky. But

Read more

How to Make Third-Party Risk Management Second Nature

It all starts with an innocent request: A vendor needs network connectivity to your environment, and quickly. Promises are made,

Read more

Long Live the Password — Even if You Don’t Want It To

In today’s interconnected world, we interact with applications and systems on myriad devices, from smartphones and tablets to desktop computers,

Read more

Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Spring is (almost) here, which means it’s time for some in-house security cleaning. With the holiday shopping season — one

Read more