Microsoft, Cloud Providers Move to Ban Basic Authentication
Microsoft moves ahead with a plan to sunset basic authentication, and other providers are moving — or have moved —…
Microsoft moves ahead with a plan to sunset basic authentication, and other providers are moving — or have moved —…
By Timothy Liu, CTO & Co-Founder, Hillstone Networks ZTNA, or zero-trust network access, seems to be one of […] The…
Overcoming the limitations inherent in drone technology By Shaun Passley, Founder, Zenadrone Drones work. From search and rescue […] The…
Investor participation from prior round demonstrates confidence in the company's current and future performance.
Phishing Attacks Continue to Grow Because Cyber Criminals Have Learned Which Psychological Buttons To Push By Franco De […] The…
Managed firewalls are increasingly popular. This post examines the strengths and weaknesses of managed firewalls to help your team decide…
A reverse-proxy Phishing-as-a-Service (PaaS) platform called EvilProxy has emerged, promising to steal authentication tokens to bypass multi-factor authentication (MFA) on…
Having a better understanding of how clouds are built, connected, and managed helps organizations mitigate risks and reduce attack surfaces.
By Kevin Kelly is the VP and GM, Global Compliance Solutions, Skillsoft More than 15 years ago, the […] The…
By Sean Malone, Chief Information Security Officer, Demandbase Security for Software-as-a-Service (SaaS) solutions has been a priority since […] The…