50% of Orgs Rely on Email to Manage Security
Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets for handling permissions.
May 16, 2022
How to Avoid Falling Victim to PayOrGrief's Next Rebrand
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.
May 13, 2022
How to Check If Your F5 BIG-IP Device Is Vulnerable
This Tech Tip walks network administrators through the steps to address the latest critical remote code execution vulnerability (CVE-2022-1388) in F5's BIG-IP management interface.
May 09, 2022
Post-Quantum Cryptography Set to Replace RSA, ECC
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.
May 06, 2022
Microsoft, Apple, and Google Promise to Expand Passwordless Features
The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledge to make the standard possible across operating systems and browsers.
May 05, 2022
GitHub to Developers: Turn on 2FA or Lose Access
All active GitHub users who contribute code will be required to enable at least one form of two-factor authentication by the end of 2023.
May 04, 2022
6 Best Practices to Ensure Kubernetes Security Meets Compliance Regulations
Security must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
May 02, 2022
Ambient.ai Expands Computer Vision Capabilities for Better Building Security
The AI startup releases new threat signatures to expand the computer vision platform’s ability to identify potential physical security incidents from camera feeds.
April 29, 2022
Doppler Takes on Secrets Management
The startup is the latest company to try to solve the problem of organizing and sharing secrets.
April 27, 2022
The Ins and Outs of Secure Infrastructure as Code
The move to IaC has its challenges but done right can fundamentally improve an organization's overall security posture.
April 26, 2022
What the ECDSA Flaw in Java Means for Enterprises
This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.
April 25, 2022
Many Medical Device Makers Skimp on Security Practices
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.
April 22, 2022
Exploring Biometrics and Trust at the Corporate Level
Biometric measurements should be part of any multifactor authentication (MFA) strategy, but choose your methods carefully: Some only establish trust at the device level.
April 21, 2022
Fortress Tackles Supply Chain Security, One Asset at a Time
Fortress Information Security will expand its Asset to Vendor Library to include hardware bill of materials and software bill of materials information.
April 20, 2022