The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t stop phishing or credential stuffing. That’s why pas… Continue reading The future of authentication: Why passwordless is the way forward

Browser extensions make nearly every employee a potential attack vector

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according to LayerX. Most extensions have access to sensitive data 99% of enterprise users have at least one extension i… Continue reading Browser extensions make nearly every employee a potential attack vector

Funding Expires for Key Cyber Vulnerability Database

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking down. The federally funded, non-profit research and development organization MITRE warned today that its contract to maintain the Common Vulnerabilities and Exposures (CVE) program — which is traditionally funded each year by the Department of Homeland Security — expires on April 16. Continue reading Funding Expires for Key Cyber Vulnerability Database

Microsoft 365 Activation Troubleshooter will fix Office subscription activation issues

If you’re facing issues activating your Microsoft 365 subscription, worry not. Microsoft offers a built-in troubleshooter, known as Microsoft 365 Activation Troubleshooter that can automatically identify and fix common issues that prevent your Mi… Continue reading Microsoft 365 Activation Troubleshooter will fix Office subscription activation issues