The Path to Passwordless Authentication Is Shorter Than We Thought

The latest Enterprise Management Associates (EMA) data revealed that passwords are problematic. If that’s the case, why are organizations so slow to adopt passwordless authentication?

The post The Path to Passwordless Authentication Is Shorter Than We Thought appeared first on Security Intelligence.

Continue reading The Path to Passwordless Authentication Is Shorter Than We Thought

The Expiration Date on Passwords Has Expired

Changing your passwords frequently sounds like commonsense advice. However, just because something is common doesn’t mean it makes sense.

The post The Expiration Date on Passwords Has Expired appeared first on Security Intelligence.

Continue reading The Expiration Date on Passwords Has Expired

The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication

When it comes to protecting businesses from the growing variety of Office 365 security threats, balancing the benefits of multifactor authentication with user demands for convenience is a fine art.

The post The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication appeared first on Security Intelligence.

Continue reading The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication

Your ‘Invisible Workforce’ Needs More Visibility in Security Planning

The workforce is becoming more “invisible.” But far too many organizations still aren’t taking this into consideration during security planning.

The post Your ‘Invisible Workforce’ Needs More Visibility in Security Planning appeared first on Security Intelligence.

Continue reading Your ‘Invisible Workforce’ Needs More Visibility in Security Planning

Cloud FreeRADIUS

The era of cloud solutions is in full swing. Just about any piece of infrastructure or application can now be delivered from the cloud. Of course, many of these solutions have been “cloud-washed,” but others have been built directly for the… Continue reading Cloud FreeRADIUS

One Identity for Office 365™ and G Suite™

At face value, it doesn’t seem like Microsoft Office 365 and Google for Work would ever be used together. In fact, Microsoft has spent billions to try and crush G Suite, so why would organizations leverage both together? Microsoft and Google cert… Continue reading One Identity for Office 365™ and G Suite™

Is Your Company Culture Seamlessly Secure — or Just Stressful?

As security practitioners, we probably have a good grasp of technological controls. But adversarial company culture may be creating stress that keeps people from protecting our data.

The post Is Your Company Culture Seamlessly Secure — or Just Stressful? appeared first on Security Intelligence.

Continue reading Is Your Company Culture Seamlessly Secure — or Just Stressful?

How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?

The post How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering appeared first on Security Intelligence.

Continue reading How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking

Identity and access management (IAM) has become increasingly challenging due to the complexity of more devices, applications, information, users and data privacy regulations.

The post Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking appeared first on Security Intelligence.

Continue reading Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking

4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise

How does Star Trek’s information security stack up against current cybersecurity hygiene best practices? Turns out the future’s not so bright.

The post 4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise appeared first on Security Intelligence.

Continue reading 4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise