Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Kevin Mitnick Password Manager Hack Demo

Kevin Mitnick, KnowBe4's Chief Hacking Officer, reveal the real risks of weak passwords. Attack assumes the hacker is already on network with victim’s IP address and password, and is trying to access passwords on the victim’s locked password manager remotely. We strongly recommend that you use a password manager to reduce password reuse and improve complexity, but you may be wondering if it’s really worth the risk. Is it safe to store all of your passwords in one place? Can cybercriminals hack them? Are password managers a single point of failure?

What is Data Room Due Diligence and Why Should You Care?

You have to wonder about modern technology that makes life much easier for you and your employees when going through not only business processes but in everyday life as well. You can take a look at a virtual data room that has been created specifically for going through due diligence. This will be your starting point for your journey into modern technology.

Video Verification API: The Technology Behind Video KYC

Video KYC (Know Your Customer) is a process for customer Identity verification using remote video technology. It is a secure and efficient way for financial institutions, online businesses, and other organizations to verify the identity of their customers without requiring them to physically visit a branch or office.

Major improvement to web crawling, more customization, and new tests

Many security teams have thousands – if not hundreds of thousands! – of known assets and unknown assets that they continuously monitor for vulnerabilities and risks. Viewing large volumes of assets can be cumbersome, particularly when observing a specific characteristic of an asset, such as the technologies it’s hosting or its DNS record type. That’s why we’re adding additional customization to the All Asset view.

CISO Interview Series: Brian Haugli

It’s a rare treat when you get the opportunity to speak with someone who has worked as an ethical hacker, has also worked in top secret military settings, and then transferred to the private sector, rising to the highest cybersecurity level in the corporate chain. We had the opportunity to speak with Brian Haugli, CEO of SideChannel. Brian is also the author of a book about the NIST Cybersecurity Framework.

Code Signing Certificate: Best Way to Protect Android and iOS Apps?

The increase in the usage of smartphones is the reason why android development has been on the rise these days. The number of smartphones has surpassed all our imagination and expectations. Two operating systems that have been the most dominant are the android operating system and iOS because millions and billions of people love them because of both Android and iOS apps. Incidents of security breaches have become so common with the ever-increasing use of both these apps.