SecureAuth Closes 2022 with Exciting Momentum as Customer Adoption Soars for Passwordless Continuous Authentication
New Reports show Office 365 Adoption – and Attacks – on the Rise

New Reports show Office 365 Adoption – and Attacks – on the Rise

  It’s no surprise that Office 365 has become the most widely-used cloud service in the world: Users ...
Damon Tepe

Confessions of a Password Tweaker – Part 2 (Same s#!t123, different password)

  The week before last, I confessed to password tweaking. Recently Troy Hunt released 320 million ...
David Ross

Confessions of a Password Tweaker

  I have a confession to make. For over twenty years, I’ve been using the same password for most ...
David Ross

The Ethics of Vendor Inaction

When Chris Roberts took the controversial action of accessing sensitive flight systems aboard a live United ...
Mandeep Khera

RIP IOCs: How Machine Learning will Revolutionize IT Security – Part II

In my last blog post, I sounded the death knell for indicators of compromise (IOCs) — attributes that implicate an ...
David Ross

RIP IOCs: How Machine Learning will Revolutionize IT Security – Part I

  For over a decade, the security industry has relied on indicators of compromise (IOCs) — attributes that ...
David Ross
Preventing Fraud After a Carrier Breach

Preventing Fraud After a Carrier Breach

The target of the latest breach to hit the news is Verizon, who announced last week that the data from over 14 ...
Jeff Hickman

What You Need to Know about the Australian Privacy Amendment Bill

  Countries around the globe are putting policies in place to strengthen security and protect their ...
Danielle Jackson

The Future of Biometrics and Authentication

As the threat landscape broadens, it’s essential that organizations adopt techniques that bring greater security ...
Mandeep Khera
Ransomware and Preventing the Misuse of Stolen Credentials

Ransomware and Preventing the Misuse of Stolen Credentials

  On the heels of the WannaCry ransomware assault comes PetyaWrap, an evolution ...
Ryan Rowcliffe
Phishing Attacks: Why they still exist and how adaptive authentication can help

Phishing Attacks: Why they still exist and how adaptive authentication can help

Check out this screenshot. Even though this e-mail is recent, I've been getting this same style of e-mail for the ...
Diego Mejia
Protecting email from cyber-attacks: Office 365 is key

Protecting email from cyber-attacks: Office 365 is key

Email has long plagued IT professionals. In the early 2000’s we began to see the beginning of the SPAM explosion ...
Brian Bowden

Pin It on Pinterest