The Trusted ID is Becoming Central to IT Cybersecurity

The latest technology trends and best practices in advanced authentication have evolved way beyond passwords. The way that employees, customers, partners and others access systems and data is driving change in how IT cybersecurity professionals create strong, safe, protected environments. As businesses move to the mobile enterprise and customers conduct more of their business on-the-go, risk-based authentication solutions are becoming one of the best options. This is especially true for Zero Trust environments and trusted digital IDs. An Overview of the Zero Trust…

0 Comments

The cybersecurity of Star Wars: The Rise of Skywalker

A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX. The long-awaited Star Wars: The Rise of Skywalker has finally hit the big screen. Not everyone has seen it yet, so we will not give away any spoilers or discuss the Death Star–size holes in the plot, or even the film’s artistic merits and demerits. We are interested in Episode IX solely from the standpoint of information security. So this post will cover…

0 Comments

Let’s punish phishing victims… er, you want to do what?!

There is a big, hairy elephant in the room when it comes to phishing: Many organisations believe that it’s okay, or right, or that they have no choice other than to punish people who repeatedly fail phishing simulations. Are they right? Before we answer that, let’s remind ourselves exactly what phishing is. What is phishing? According to the NCSC, phishing… “describes a type of social engineering where attackers influence users to do ‘the wrong thing’, such as disclosing information or clicking a bad link.…

0 Comments

What are Cloud Security and Posture Management tools?

Gartner had in its report published in early 2019, recommended that security leaders invest in cloud security and posture management tools to identify and remediate the risks of misconfiguration, mismanagement, and mistakes. Enterprises have since then started focusing on cloud security and are on the look-out for a dynamic cloud security solution but are still unaware of what tool to look for in a tool. Within the cloud security space, there are Cloud Access Security Brokers (CASBs), Cloud Workload Protection Platforms (CWPPs), and…

3 Comments

End of content

No more pages to load