Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

What Are Scam Calls and How Can I Stop Them?

Scam calls are phone calls you may receive that are unsolicited, spoofed and claim to be from someone or a company they’re not. For example, you may receive a phone call claiming to be law enforcement and while the caller ID and location may match a legitimate police department, it has been spoofed to look legitimate. There are a few ways you can prevent receiving scam calls such as getting an app that blocks them.

Random but Memorable - Episode 10.3: Ransomware Hunting Team Emergency

On today's show we shine a spotlight on an incredible real-life technological thriller, as we invite Renee Dudley and Dan Golden to discuss their new book: The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime.

How to Protect Your Online Privacy

You can protect your online privacy by being aware of and cleaning your digital footprint; using strong, unique passwords for each of your accounts; not oversharing on social media; reading privacy policies carefully and more. Continue reading to learn more about online privacy and the steps you can take to protect yours.

Passkeys and the future of authentication: Q&A with Andrew Shikiar, CMO of FIDO Alliance

What are passkeys? How do they fit into a passwordless future? Why is user experience the key to adoption for passwordless? These are just a few of the questions people have for the FIDO Alliance – an open industry association that wants to reduce the world’s reliance on passwords.

Hello CISO - Episode 9: Practicing Good Breach Response

What makes a company successful at breach response? In a word, preparation. In this episode, Troy breaks down an historically bad example of breach response, and how to avoid a similar fate. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.

What to Do If Your Identity Is Stolen

There are several steps you should take after discovering your identity has been stolen such as getting a copy of your credit reports, contacting your credit card issuers and banks, reporting the theft to the FTC and placing a security freeze on your credit. Read on to learn more about identity theft and what you can do to mitigate the risks of having your identity stolen in the future.

How Executives Can Stay Safe From Cyberattacks

The C-Suite and other senior executives are frequently the targets of cyberattacks. As the most visible members of an organization, executives have access to sensitive information, influence inside the organization and a public platform, making them valuable targets for cybercriminals. Organizations of all sizes need to actively reduce risk for senior management.