Companies with zero-trust network security move toward biometric authentication

Companies with zero-trust network security move toward biometric authentication

Many organizations are moving away from using the network perimeter as a trust indicator when building and enforcing access policies for apps and other IT…

View More Companies with zero-trust network security move toward biometric authentication
Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…

View More Assume breach is for losers: These steps will stop data breaches
This server was online for under a minute before hackers were trying to crack it

This server was online for under a minute before hackers were trying to crack it

It can only take seconds before cybercriminals start attempting to hack into newly connected cloud devices and services, as attackers relentlessly pursue new avenues to…

View More This server was online for under a minute before hackers were trying to crack it
Google will now let you use your Android phone as a physical security key

Google will now let you use your Android phone as a physical security key

Google announced today that any phone running Android 7 or higher can now be used as a physical security key for two-factor authentication, giving you an even…

View More Google will now let you use your Android phone as a physical security key
Gustuff banking botnet targets Australia

Gustuff banking botnet targets Australia

Cisco Talos has uncovered a new Android-based campaign targeting Australian financial institutions. As the investigation progressed, Talos came to understand that this campaign was associated…

View More Gustuff banking botnet targets Australia
Half of online banks allow hackers to steal your money

Half of online banks allow hackers to steal your money

All online banks risk giving attackers unauthorized access to personal data, funds, and sensitive information, according to Positive Technologies. Attackers can access personal data and…

View More Half of online banks allow hackers to steal your money