Uber has had a difficult year. It took another hit last week with the news that it had covered up a data breach that occurred more than a year ago. Read more
Deploying DMARC can seem confusing and overwhelming at first. In our previous blog post on the topic, we talked about basic tips to keep in mind when deploying a DMARC record. Read more
Biometric technology has long been touted as the replacement for traditional passwords, and many security researchers are investing in research into the technology. Read more
A new scam is tarnishing the reputation and image of organizations by tricking businesses and individuals. Read more
Last year was an unprecedented time for cyber security and fraud with a record number of exploited vulnerabilities and high-profile breaches. Read more
This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Companies are constantly looking for ways to streamline their business processes and ensure that legitimate customer activity is kept safe. Read more
A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how Read more