2 min read
The one-two punch of user and device trust
Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications....
2 min read
Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications....
1 min read
In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses,...
2 min read
One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple...
1 min read
Mobile device security is paramount in today’s IT landscape. There are plenty of ways to be sure your employees are accessing data safely away from...
2 min read
by Chris McKewon, CEO, Xceptional
4 min read
A few months back, my colleagues made several predictions for technologies in 2019—everything from artificial intelligence (AI) and machine learning...
2 min read
You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network...
2 min read
In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat...
2 min read
Around this time every year, I always see an influx of the top trends in technology. It seems like the perennial hot topic is security, with good...