Mar 20, 2023How to Defend Against The Threat Of Social Engineering Scams Targeting OrganizationsSocial engineering scams are growing in sophistication, as fraudsters increasingly use coercion and manipulation to exploit victims....
Mar 16, 2023Nordpass Introduces a Passkey Management Solution for a Passwordless FutureNordPass, a password management company created by the VPN provider NordVPN, has announced a new solution called NordPass Passkeys, which...
Mar 15, 2023How Organizations Can Successfully Implement Red Teaming and Pen Testing Into Their Cyber StrategiesRed teaming and penetration testing (pen testing) are two essential cybersecurity practices that help organizations identify...
Mar 14, 2023Zoll Medical Breach Exposes Compromises Data for 1M+ PeopleZoll Medical, a medical device and software manufacturer, has announced that the personal and health information of over a million...
Mar 14, 2023New Report: Inside the High Risk of 3rd-Party SaaS AppsThis guest article was provided by Adaptive Shield Employees are granting third-party apps access to the company’s SaaS apps, especially...
Mar 13, 2023How Companies Can Can Prevent Multi-Factor Authentication AttacksMulti-factor authentication (MFA) is an effective way to enhance security by requiring multiple forms of authentication before granting...