As more aspects of daily life move online—including financial transactions, government services like mobile driver’s licenses, and digital travel authentication—the…
Despite lagging in technology adoption, African and Middle Eastern organizations are catching up, driven by smartphone acceptance and national identity…
Managing sensitive security investigations has become more complex and challenging in today’s increasingly prevalent remote work environment. As a result,…
PowerSchool hacker claims they stole data of 62 million students
The hacker who breached education tech giant PowerSchool claimed in an extortion demand that they stole the personal data of…
The Cyber Resilience Act: How Manufacturers Can Meet New EU Standards and Strengthen Product Security
Cybersecurity has become a leading priority for manufacturers of embedded systems and IoT devices. The rapid proliferation of these technologies,…
Passwords Are Out, Biometrics Are In
As more aspects of daily life move online—including financial transactions, government services like mobile driver’s licenses, and digital travel authentication—the…
Use this AI chatbot prompt to create a password-exclusion list
Creating a custom password-exclusion list can help prevent employees from using passwords that are likely to be guessed. Learn from…
Will 2025 See a Rise of NHI Attacks?
The flurry of non-human identity attacks at the end of 2024 demonstrates extremely strong momentum heading into the new year.…
Securing Election Integrity In 2024: Navigating the Complex Landscape of Modern Threats
As we navigate the 2024 election year, safeguarding the integrity of our democratic process is more critical than ever. While…
Mandatory MFA, Biometrics Make Headway in Middle East, Africa
Despite lagging in technology adoption, African and Middle Eastern organizations are catching up, driven by smartphone acceptance and national identity…
Managing Sensitive Security Investigations in Remote Settings
Managing sensitive security investigations has become more complex and challenging in today’s increasingly prevalent remote work environment. As a result,…
Is Unified Access Control Zero Trust’s Silver Bullet?
With the advent of Zero Trust architecture, where the principle of “never trust, always verify” prevails, the importance of comprehensive…
Name That Toon: Incentives
Feeling creative? Have something to say about cybersecurity? Submit your caption and our panel of experts will reward the winner…