Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Protect Your Online Privacy

You can protect your online privacy by being aware of and cleaning your digital footprint; using strong, unique passwords for each of your accounts; not oversharing on social media; reading privacy policies carefully and more. Continue reading to learn more about online privacy and the steps you can take to protect yours.

Hello CISO - Episode 9: Practicing Good Breach Response

What makes a company successful at breach response? In a word, preparation. In this episode, Troy breaks down an historically bad example of breach response, and how to avoid a similar fate. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.

Passkeys and the future of authentication: Q&A with Andrew Shikiar, CMO of FIDO Alliance

What are passkeys? How do they fit into a passwordless future? Why is user experience the key to adoption for passwordless? These are just a few of the questions people have for the FIDO Alliance – an open industry association that wants to reduce the world’s reliance on passwords.

What to Do If Your Identity Is Stolen

There are several steps you should take after discovering your identity has been stolen such as getting a copy of your credit reports, contacting your credit card issuers and banks, reporting the theft to the FTC and placing a security freeze on your credit. Read on to learn more about identity theft and what you can do to mitigate the risks of having your identity stolen in the future.

How Executives Can Stay Safe From Cyberattacks

The C-Suite and other senior executives are frequently the targets of cyberattacks. As the most visible members of an organization, executives have access to sensitive information, influence inside the organization and a public platform, making them valuable targets for cybercriminals. Organizations of all sizes need to actively reduce risk for senior management.

Why You Shouldn't Turn Off 2FA

You shouldn’t turn off your Two-Factor Authentication (2FA) because it removes the extra layer of security it adds to your account, making it easier for cybercriminals to compromise it. Keep on reading to learn why 2FA should be left enabled for your online accounts and why it should be added to your accounts if it isn’t already.

How to Tell If a Website is Legit

The internet is used for just about everything in our lives: to pay bills, shop, stream movies, attend school, work remotely and more. Since we are now online more than ever, cybercriminals are always coming up with new ways to steal data. One way is by leading people to illegitimate websites, which is why it’s crucial that you know how to spot a legitimate site from a phony one.