passwords, passkeys, 1Password passwordless credential stuffing Password We Still Use Bad Passwords

Passkeys Can Make Passwords a Thing of the Past

We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when, time and again, they show how bad they are at securing our ...
Security Boulevard
identity, risk, CrowdStrike digital identitiies Identity Theft Financial Fraud Digital Age

Identity Security a Top Priority as Threats Evolve

The need to secure digital identities is one of the biggest privacy and data issues facing organizations today, and with less than half of organizations (49%) proactively investing in securing identities, there ...
Security Boulevard
Wiz multi-cloud, security, CNAPP cloud computing cybersecurity Orca Kubernetes TDIR cloud and container security

Who Owns Security in Multi-Cloud Operations?

The best-kept secret is the one that is never shared. In today’s technology environment, that is even more true. Where organizations used to build and maintain their own technology stacks, now they ...
Security Boulevard
identity governance security Spera deepfake identity management

Identity Governance: Right People, Right Access, Right Time

Enterprise companies are increasing spending on software-as-a-service (SaaS) tools to enhance employee productivity and drive digital transformation projects. In doing so, IT teams are facing new challenges to ensure the right level ...
Security Boulevard
risk managed detection and response

A 2023 Mantra: Think of Cybersecurity Risk as Business Risk

The line between business risk and cybersecurity risk has been obliterated. Increasingly, companies cannot separate risk models built around financial uncertainty and legal liabilities from IT security risk. For risk management officers, ...
Security Boulevard
industrial Colonial Pipeline critical infrastructure OT Utilities

How Demanding Conditions Impact Critical Infrastructure Security

Enterprises already understand how important a role physical security plays in protecting their staff, work environments and privileged information from outsiders. Fences, walls, security guards and RFID-controlled doors all help organizations protect ...
Security Boulevard
identity governance security Spera deepfake identity management

What you Missed in the White House National Cybersecurity Strategy

On the heels of the White House’s National Cybersecurity Strategy, there were plenty of reactions and opinions about how cybersecurity strategies and priorities must change. But most people missed one critical callout: ...
Security Boulevard

How Zero Trust Enables the National Cybersecurity Strategy

| | Blog, cyber, data
5 min read The recently released US National Cybersecurity Strategy stresses a commitment to the application of a zero-trust architecture as well as the modernization of both IT and OT systems. The ...

Lessons Learned from the Ongoing LastPass Data Breach Saga

| | Blog, cyber, data
5 min read The LastPass data breach debacle could happen to anyone. We break down the ongoing attacks and offer tips for avoiding a similar fate. The post Lessons Learned from the ...
Understanding Pseudonymization and Anonymization

Understanding Pseudonymization and Anonymization

Maintaining an engaged workforce is a requirement in a competitive market. An engaged workforce is more productive. A study by Gallup found companies with highly engaged teams were 21 per cent more ...