Companies with zero-trust network security move toward biometric authentication

Companies with zero-trust network security move toward biometric authentication

Many organizations are moving away from using the network perimeter as a trust indicator when building and enforcing access policies for apps and other IT…

View More Companies with zero-trust network security move toward biometric authentication
Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…

View More Assume breach is for losers: These steps will stop data breaches
Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Hackers backed by the Iranian government recently tried to hack email accounts used by the campaign of a US presidential candidate, a Microsoft official said…

View More Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign
Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come tons of data, including some…

View More Attention Facebook Users: Here’s What You Need to Know About the Recent Breach