Articles Related to credentials

Security expert dives deeply on four types of email attack

In a recent ITWC briefing, Roger A. Grimes, Data-Driven Defense Evangelist, KnowBe4, said there are many types of email attack being employed by hackers...

Cyberthreats are on the rise; do you know where they’re coming from and how to protect against them?

By Kevin Magee, Chief Security and Compliance Officer for Microsoft Canada 2020 has brought about major disruptions to both our physical and digital worlds. It...

2019 Cloud Security Predictions

By Matthew Chiodi, Chief Security Officer, public cloud at Palo Alto Networks   Enterprises have been enjoying the flexibility and torrent of innovation that public...

Botnet-powered credential stuffing still a problem: Report

Because credential stuffing is still no one’s responsibility at many organizations, it will almost certainly continue to be profitable for the attacker, according to a report from Akamai

Playing the long security game in a world of constant change

At a time of nonstop technological shift and churn, of terraforming and re-terraforming in cyber security, agility and the ability to improvise and pull...

Stay on op - Ge the daily news in your inbox