December 17, 2018
The password is dead. With an overwhelming
81% of data breaches occurring as a result of stolen or compromised credentials, passwords fail to provide secure access for end users. Read more
February 5, 2018
Cybercriminals make billions of dollars each year preying on naïve users and vulnerable businesses. Individual attackers, criminal bands, and state actors seldom rest on their laurels; greed drives them to constantly improve their attack strategies.
November 30, 2017
Uber has had a
difficult year. It took another hit last week with the news that it had covered up a data breach that occurred more than a year ago. Read more
November 2, 2017
Deploying DMARC can seem confusing and overwhelming at first. In
our previous blog post on the topic, we talked about basic tips to keep in mind when deploying a DMARC record. Read more
June 12, 2017
Biometric technology has long been touted as the replacement for traditional passwords, and many security researchers are investing in research into the technology.
February 14, 2017
A new scam is tarnishing the reputation and image of organizations by tricking businesses and individuals.
January 26, 2017
Last year was an unprecedented time for cyber security and fraud with a record number of exploited vulnerabilities and high-profile breaches.
January 13, 2017
This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
October 3, 2016
Companies are constantly looking for ways to streamline their business processes and ensure that legitimate customer activity is kept safe.
July 14, 2016
showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent report we showed how recent post Read more