Blogs

DON’T BE THE NEXT VICTIM OF A CYBER ATTACK
09Aug

DON’T BE THE NEXT VICTIM OF A CYBER ATTACK

Cyber-attacks are demolishing businesses more than COVID-19 is. Don’t trust us? See these two stats (there are tons of other stats): Up to 88% of UK companies have suffered cyber-attacks in the last 12 months (Source) One small business in the UK is successfully hacked every 19 seconds. (Source) And this isn’t even the worst news. The […]

Reduce Phishing and Spoofing: Decommission Phone & SMS Factors ASAP
06Nov

Reduce Phishing and Spoofing: Decommission Phone & SMS Factors ASAP

Introduction: Phishing and spoofing attacks remain a significant concern in the modern cybersecurity landscape. As hackers continue to refine their tactics, it’s clear that certain outdated security mechanisms are no longer adequate. One of the most critical areas for improvement is the decommissioning of phone and SMS-based authentication factors. Although once seen as a robust […]

Weak MFA Factors Are Open Doors for Fraudsters
20Oct

Weak MFA Factors Are Open Doors for Fraudsters

Introduction: Multi-Factor Authentication (MFA) has long been hailed as a critical defense against unauthorized access, adding layers of security beyond just passwords. However, in 2024, not all MFA is created equal. Weak MFA factors, such as SMS-based authentication or easily guessed security questions, are increasingly being exploited by cybercriminals. These vulnerabilities open doors for fraudsters, […]

Lifecycle Management Best Practices
20Oct

Lifecycle Management Best Practices

Introduction: Identity lifecycle management (ILM) is a critical process for ensuring that users have the right level of access to the right resources at the right time. In 2024, as businesses continue to operate in increasingly complex digital environments, effective ILM is more important than ever. Organizations must follow best practices to ensure that their […]

Fraud Protection Starts with the Desktop
20Oct

Fraud Protection Starts with the Desktop

Introduction: Fraud protection often focuses on high-profile threats such as network breaches and cyber-attacks, but the reality is that many security issues start at the desktop level. In 2024, ensuring robust fraud protection requires a comprehensive approach that begins with securing individual endpoints. Desktops, laptops, and other end-user devices are prime targets for attackers, and […]

Security on High Alert: Holidays Bring Cheer, but Malicious Activity Peaks
19Dec

Security on High Alert: Holidays Bring Cheer, but Malicious Activity Peaks

Holiday Season: A Double-Edged Sword  The holiday season brings a flurry of activities, both for businesses and cybercriminals. As e-commerce sales surge and businesses ramp up operations, malicious actors see an opportunity to exploit the increased digital activity. Research consistently shows a spike in cyberattacks during the holiday months, targeting consumers and enterprises alike.  According […]

Continuous Adaptive Trust is the New MFA
20Nov

Continuous Adaptive Trust is the New MFA

Introduction: Traditional multi-factor authentication (MFA) has long been a cornerstone of cybersecurity strategies. However, as cyber threats become more sophisticated, it’s clear that MFA alone is no longer enough to protect sensitive systems and data. The rise of Continuous Adaptive Trust (CAT) marks a new chapter in authentication practices, offering a more dynamic and context-aware […]

ISPM: What Is It and Why Should We Care?
20Nov

ISPM: What Is It and Why Should We Care?

As the cybersecurity landscape continues to evolve, new frameworks and protocols are emerging to address the increasing complexity of managing sensitive information. One such framework gaining attention is Information Security Policy Management (ISPM). While some may see ISPM as just another acronym in the sea of cybersecurity terms, understanding its significance is crucial for organizations […]

Another Data Breach, Another Offer for Free Credit Monitoring: Face the Facts, Our Data is Already Out in the Wild
18Nov

Another Data Breach, Another Offer for Free Credit Monitoring: Face the Facts, Our Data is Already Out in the Wild

Introduction: In today’s digital age, data breaches have become alarmingly common. Every other week, news breaks about a major organization losing sensitive information to hackers. The response from companies often follows a familiar pattern: free credit monitoring services offered to affected customers. While this gesture may seem like a reasonable response, the reality is far […]

Advances in Machine Learning with AI
20Oct

Advances in Machine Learning with AI

Introduction: Machine learning (ML) and artificial intelligence (AI) are driving transformative changes across various industries, including cybersecurity. In 2024, the integration of ML and AI technologies is enhancing threat detection, automating responses, and improving overall security posture. These advances are enabling organizations to better protect against evolving threats and manage increasingly complex security environments. How […]

Beyond Authentication: Continuous Adaptive Evaluation of Permissions (CAEP)
20Oct

Beyond Authentication: Continuous Adaptive Evaluation of Permissions (CAEP)

Introduction: As cybersecurity threats evolve, so too must the methods used to safeguard access to sensitive resources. Traditional authentication, which relies on a single point of verification, has proven insufficient to counter modern cyber risks. In 2024, Continuous Adaptive Evaluation of Permissions (CAEP) is emerging as a critical extension of authentication that goes beyond the […]

Access Management

Security on High Alert: Holidays Bring Cheer, but Malicious Activity Peaks

Holiday Season: A Double-Edged Sword  The holiday season brings a flurry of activities, both for businesses and cybercriminals. As e-commerce …

Read More
Access Management

Continuous Adaptive Trust is the New MFA

Introduction: Traditional multi-factor authentication (MFA) has long been a cornerstone of cybersecurity strategies. However, as cyber threats become more sophisticated, …

Read More
Access Management

ISPM: What Is It and Why Should We Care?

As the cybersecurity landscape continues to evolve, new frameworks and protocols are emerging to address the increasing complexity of managing …

Read More
Access Management

Another Data Breach, Another Offer for Free Credit Monitoring: Face the Facts, Our Data is Already Out in the Wild

Introduction: In today’s digital age, data breaches have become alarmingly common. Every other week, news breaks about a major organization …

Read More
Access Management

Reduce Phishing and Spoofing: Decommission Phone & SMS Factors ASAP

Introduction: Phishing and spoofing attacks remain a significant concern in the modern cybersecurity landscape. As hackers continue to refine their …

Read More
Access Management

Advances in Machine Learning with AI

Introduction: Machine learning (ML) and artificial intelligence (AI) are driving transformative changes across various industries, including cybersecurity. In 2024, the …

Read More