Cyber Security Defending Your Remote Workforce with Zero Trust Security May 10, 2022 cyberdefensemagazine.com By Raul Popa, CEO & Co-founder, TypingDNA To truly understand zero trust, you must rethink your mindset of […] The…
Cyber Security Your Phone May Soon Replace Many of Your Passwords May 7, 2022 krebsonsecurity.com Apple, Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and…
Cyber Security Ikea Canada Breach Exposes 95K Customer Records May 6, 2022 darkreading.com An unauthorized employee accessed Ikea's customer database, but it's unclear what the intention was.
Cyber Security White House Moves to Shore Up US Post-Quantum Cryptography Posture May 6, 2022 darkreading.com Biden's executive order pushes new NIST quantum-cryptography standards and directs federal government to move toward quantum-resistant cybersecurity.
Cyber Security Microsoft, Apple, and Google Promise to Expand Passwordless Features May 5, 2022 darkreading.com The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledged to make passwordless possible across operating…
Cyber Security NIST Issues Guidance for Addressing Software Supply-Chain Risk May 5, 2022 darkreading.com Amid ongoing software supply-chain jitters, the US' top tech division is offering a finalized, comprehensive cybersecurity control framework for managing…
Cyber Security A Third of Americans Use Easy-to-Guess Pet Passwords May 5, 2022 darkreading.com Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest…
Cyber Security SolarWinds Attackers Gear Up for Typosquatting Attacks May 3, 2022 darkreading.com The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging…
Cyber Security New Regulations in India Require Orgs to Report Cyber Incidents Within 6 Hours May 2, 2022 darkreading.com CERT-In updates cybersecurity rules to include mandatory reporting, record-keeping, and more.
Cyber Security 2022 Security Priorities: Staffing and Remote Work Apr 29, 2022 darkreading.com A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote…
Defending Your Remote Workforce with Zero Trust Security
By Raul Popa, CEO & Co-founder, TypingDNA To truly understand zero trust, you must rethink your mindset of […] The…
Your Phone May Soon Replace Many of Your Passwords
Apple, Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and…
Ikea Canada Breach Exposes 95K Customer Records
An unauthorized employee accessed Ikea's customer database, but it's unclear what the intention was.
White House Moves to Shore Up US Post-Quantum Cryptography Posture
Biden's executive order pushes new NIST quantum-cryptography standards and directs federal government to move toward quantum-resistant cybersecurity.
Microsoft, Apple, and Google Promise to Expand Passwordless Features
The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledged to make passwordless possible across operating…
NIST Issues Guidance for Addressing Software Supply-Chain Risk
Amid ongoing software supply-chain jitters, the US' top tech division is offering a finalized, comprehensive cybersecurity control framework for managing…
A Third of Americans Use Easy-to-Guess Pet Passwords
Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest…
SolarWinds Attackers Gear Up for Typosquatting Attacks
The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging…
New Regulations in India Require Orgs to Report Cyber Incidents Within 6 Hours
CERT-In updates cybersecurity rules to include mandatory reporting, record-keeping, and more.
2022 Security Priorities: Staffing and Remote Work
A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote…