What is SAML?

SAML is an open standard for exchanging authentication and authorization data between an IdP and SP. Learn more about why it's useful.
July 29, 2020
Read More ⭢

OpenVPN Cybersecurity Health Check

Cyberthreats are increasing rapidly, both in terms of volume and sophistication. Falling victim to a breach can cause a lot of damage to an organization.
April 30, 2020
Read More ⭢

SIM PIN

SIM hacking is not exclusive to T-Mobile though — in fact, this could happen at any carrier. You can add another layer of protection to your phone by adding a SIM PIN.
December 6, 2019
Read More ⭢

KNOB Attack

A trio of researchers have discovered a vulnerability that has the potential of attacking billions of Bluetooth-enabled devices.
November 29, 2019
Read More ⭢

Disabling a Firewall

A firewall is a tool used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks.
November 21, 2019
Read More ⭢

LastPass Vulnerability

Facebook's Mark Zuckerberg, Google's Sundar Pichai, Twitter's Jack Dorsey, Spotify’s Daniel Ek, Uber’s Travis Kalanick — the list could go on for CEOs whose Twitter accounts were hacked due to poor password hygiene.
November 8, 2019
Read More ⭢

IoT Data

IoT means everyday objects, such as smart plugs, lightbulbs, locks, coffee machines, and motion sensors can connect to the internet and creating a copious amount of data.
October 31, 2019
Read More ⭢

Password Hygiene and the Disrupted Customer Experience

When companies in retail or enterprise remind their online visitors to change their passwords, are they doing them a favor — or causing them grief?
October 18, 2019
Read More ⭢

2FA Is Not Invincible

Organizations need to take responsibility for sensitive data. Every business should be using two-factor authentication (2FA) whenever possible.
July 17, 2019
Read More ⭢

Network Visibility

Cloud-based network visibility solutions are beginning to emerge on the market, making it possible to gain end-to-end network insights.
September 19, 2019
Read More ⭢

Cybercrime-as-a-Service

What can business leaders do to protect themselves from these Cybercrime-as-a-Service attacks? Here are five steps that can help reduce the risk.
August 23, 2019
Read More ⭢