Top security threats to financial services

Hackers go for the gold. This means that banking information makes for the number one target. These cyberattacks lead to the theft of large sums of money, undermine the economic stability of individuals and organizations, as well as destroy the reputation of banks and other financial institutions.

Read more

The one-two punch of user and device trust

Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access equation.

Read more

Why you should care about HTTPS

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple as looking at your URL bar to check whether the URL string starts with “https” and whether there is a symbol of a closed padlock beside it.

Read more

Hello world! Contextual identity within the spacetime continuum

Hello world! I think that’s the obligatory first line for any technology blog, right? But, how do you know I am here? How do you know I exist? I have a blog profile, I have a picture, I have a blog tagged to my name. All of these are contextual clues that I exist in […]

Read more

Five ways the state of security will evolve in 2019

A few months back, my colleagues made several predictions for technologies in 2019—everything from artificial intelligence (AI) and machine learning (ML) to hybrid cloud, blockchain and the Internet of Things (IoT). Through those discussions, as well as insight from our own internal experts, they compiled predictions for the new year across a range of topics.

Read more

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network where the exchange of information is often difficult to track. Here are some good reasons to “go incognito”. With the headlines about data breaches and cyberattacks greeting […]

Read more

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and iteratively searching through your network to detect and isolate advanced threats that evade existing security solutions.

Read more

The most pressing data concern in 2019

Around this time every year, I always see an influx of the top trends in technology. It seems like the perennial hot topic is security, with good reason as each year the number of incidents and evolving creativity with which these attacks are orchestrated contribute to an increase in the sheer magnitude of losses.

Read more

Five common misconceptions about DDoS

In my first blog on distributed denial-of-service (DDoS) detection, “DDoS: It’s Not a Matter of If, But When,” I provide a brief understanding why someone might initiate a DDoS attack and outlined the three variations of attacks. In part two of this series, I refute five commonly held misconceptions about DDoS. I don’t mean to scare […]

Read more