Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Allow is the New Block - 10 Requirements to Safely Say "Yes" to Shadow IT

Given the lack of visibility and control, what does the security team do about shadow IT? Do they take extreme security measures and try to block them using legacy security tools or do they allow their use and hope users stay secure from threats and don't leak sensitive data?

Cybersecurity Predictions: Your phone matters more than your password

The password may be one of the worst security elements we have. They are oftentimes easily guessed because we, as humans, are generally pretty bad at creating and remembering them. So, we use weak passwords across multiple accounts. We use simple passwords like “123456” or “password.” The industry is also yet to find something better. The phone, however, presents new and exciting ways for companies to protect their accounts, which means the phone is also become a critical part of the hacker “kill chain.”

The Risks of Smartphone and MFA Usage in Organizations

Smartphones have become essential in workplaces for boosting productivity, but they bring their own set of security challenges. Apps like Microsoft Authenticator add an extra security layer, but they also have their vulnerabilities: If a smartphone with an app like Microsoft Authenticator is compromised, the consequences can be severe for a company.