Password-based authentication is both the first line of defense, and the weakest link, when it comes to securing your SaaS applications. We know that end-users default to poor password practices—recent reports found 99% of users reusing passwords either across work accounts, or between work and personal accounts.
Criminal hackers look eagerly toward the holidays because it's a time for vacations, general absences, and fewer eyes on the organization's passwords. There is a 30% increase in the average number of ransomware attacks over the holiday period compared to the monthly average.
In this article, learn how CPRA extends the definitions and scope of the CCPA, how businesses should think about CPRA enforcement, and what CPOs can do to help their companies ensure effective and frictionless compliance with CPRA.
According to iapp, almost half of all data breaches in 2022 began with stolen credentials and ransomware damages are expected to exceed $30 billion worldwide in 2023.
Attackers used SMS text messages as a delivery mechanism is the Twilio and Cloudflare attack. Additionally, the attackers seemed to have targeted specific employees and they demonstrated significant knowledge of who those employees regularly interacted with.
See how CPOs and other data privacy professionals are preparing to comply with potential new state rules – even as they also work to ensure compliance with various international and state-level data privacy laws.
When the US Supreme Court overturned the landmark 1973 Roe v. Wade decision, it immediately increased the importance of protecting medical data privacy for a wide range of healthcare-related businesses, How are governments and businesses responding and what are the steps that CPOs can take?
New report showing individual compliance regulations and their propensity to allow breached passwords into the fold – up to 83% of known breached passwords can satisfy regulatory compliance standards.
There is more to pandemic burnout than just wanting the world to go back to the way that it used to be. Pandemic burnout is directly contributing to a variety of cybersecurity problems.
There is no question: multi-factor authentication helps protect business-critical resources using password-based authentication. However, how can organizations successfully implement multi-factor authentication for password resets when not every user has a mobile device to verify their identity?