Making the Move to Multifactor Authentication

Over the last few years, multifactor authentication (MFA) has come a long way. In the past, MFA required that you carry a hard token on you at all times, but now, it has become a simple, one-touch endeavor. However, many still perceive MFA as a cumber… Continue reading Making the Move to Multifactor Authentication

Zero Trust Approach to Threat Intelligence – BSidesSF Preview

Zero Trust is a security concept that is based on the notion that organizations should not take trust for granted, regardless of whether access attempts originate from inside or outside its perimeters. An enterprise needs to verify any attempt for conn… Continue reading Zero Trust Approach to Threat Intelligence – BSidesSF Preview

Huawei Controversy Highlights 5G Security Implications

Security experts say that 5G supply chain concerns should be taken seriously – whether it’s in the context of Huawei or not. Continue reading Huawei Controversy Highlights 5G Security Implications

Workarounds for Two-Factor Authentication in a Workplace That Isn’t BYOD-Friendly

Two-factor authentication can be difficult in a workplace that doesn’t allow smartphones. But it’s not impossible It’s hard to overstate how dramatically the smartphone has changed our world and our daily lives. With an estimated 2.5 billi… Continue reading Workarounds for Two-Factor Authentication in a Workplace That Isn’t BYOD-Friendly

Hostinger Resets Client Passwords Following Security Incident

Web hosting provider and Internet domain registrar Hostinger reset all Hostinger Client passwords following a security incident. On 23 August, Hostinger learned from an informational alert that an unauthorized party had gained access to one of its serv… Continue reading Hostinger Resets Client Passwords Following Security Incident

Threatlist: Targeted Espionage-as-a-Service Takes Hold on the Dark Web

One in four underground merchants offer advanced hacking services, once reserved for APTs and well-funded organized crime gangs. Continue reading Threatlist: Targeted Espionage-as-a-Service Takes Hold on the Dark Web