Tag "Multifactor Authentication"

Back to homepage
Software

Protect Your Organization Against Password Spraying

Password spraying, unlike traditional brute force attacks, often stays under the radar. Instead of targeting a single account with multiple password guesses, password spraying uses a high-probability password against multiple

IT Compliance

Authentication in the Age of GDPR

It’s been over a year since the enforcement of the long-planned General Data Protection Regulation (GDPR) began, marking the start of a new regulatory era for data management. GDPR impacts

Cloud Expert Articles

Cloud Security For Businesses

By Katherine Palac – Director of Marketing at Column Information Security, Taking advantage of new technology means being cautious about it. Although the impulse for many businesses is to jump

Software

Zero Trust: The Modern Approach To Cybersecurity

Security strategy begins with an attitude: Never trust, always verify. The conventional notion of the enterprise perimeter—imagining it as one big bubble to be protected—is now thoroughly outdated in a

Software

Are your passwords among the 100,000 most breached ones?

Year after year, the list of most often used passwords changes but a little: the latest one, compiled by infosec researcher Troy Hunt and published by the UK National Cyber

Hardware/Network

5 Questions to Help Chart Your Course to Zero Trust Security

It wasn’t that long ago that businesses restricted employees from doing certain activities online. Despite spending most of their time on the road, sales teams but could only access customer

Hardware/Network

Security Of Enterprise Wireless Networks

Providing enterprise network security is becoming an increasingly complex undertaking, as the number of threats emanating from the Internet continues to grow. Hackers continue to find new ways to attack

Industry Insights

The Tech Trends That Will Shape 2019

With every passing year comes an exciting set of technological trends. Whether these are built around an entirely new idea or an upgrade to an existing technology, these trends bring

Software

Best Practices for Choosing Good Security Questions

Security questions can add an extra layer of certainty to your authentication process. Security questions are an alternative way of identifying your customers when they have forgotten their password, entered

IT Compliance

Why User Names and Passwords Are Not Enough

Over the past few years, it’s become evident that attackers are no longer “hacking” to carry out data breaches ― they are simply logging in by exploiting weak, stolen, or