California is now leading the charge to beef up the cyber security features of connected devices by banning weak passwords, forcing device manufacturers to supply a unique password or force a password change on startup.
Securing Active Directory credentials is absolutely crucial to protect against network breaches. Access management can help put a protective layer at the forefront of your network.
Reddit hack shows that the industry standard two-factor authentication approach in certain cases might not offer as much protection of vulnerable data as has long been thought.
Study on 9 billion recovered login credentials shows significant password reuse which can help cybercriminals conduct credential stuffing attacks and possible account takeover.
We look at the ease of use, reliability and strength of Apple's iPhone X new Face ID security feature. Should you keep your face (password) to yourself?
Even with 64% of cloud security incidents stemming from unauthorized access, businesses are still underestimating access security with only 7% of security leaders citing account takeovers as top risk.
By protecting machine-to-machine communication using machine identity protection, you can help stop many insider threats and a wide variety of other security threats, before they can damage your network and your company as a whole.
Honeypots set up by Sophos logged a staggering amount of scripted attacks attempting to pass default credentials. What’s more alarming is the aggressive speed and scale of these attempts with the first attack in less than 60 seconds.
A new phishing attack started to surface where hackers leverage on Microsoft OAuth apps to steal user credentials from SharePoint and OneDrive users using official Office 365 login page.
With six million Instagram accounts hacked, are passwords now a liability and is it time to turn on that Instagram two-factor authentication?