Okta breach post mortem reveals weaknesses exploited by attackers
The recent breach of the Okta Support system was carried out via a compromised service account with permissions to view...
Read more →The recent breach of the Okta Support system was carried out via a compromised service account with permissions to view...
Read more →Android VPN apps that have gone through an independent security validation will now be able to claim that distinction on...
Read more →Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses,...
Read more →In this Help Net Security interview, Sarah Pearce, Partner at Hunton Andrews Kurth, offers insights into the evolving landscape of...
Read more →In the last two years, the average organization’s cybersecurity program was prepared to defend preventively, or block, just 57% of...
Read more →The risk associated with dependence on a particular cloud provider for multiple business capabilities is in the top five emerging...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: AI threat landscape: Model theft...
Read more →North Korean hackers are using novel MacOS malware named KandyKorn to target blockchain engineers of a cryptocurrency exchange platform. The...
Read more →Nearly 22 years after Bill Gates announced a concerted Microsoft-wide push to deliver Trustworthy Computing, the company is launching the...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from Action1, Enzoic, Immuta, and Snappt....
Read more →While 86% of compliance, operations, risk and IT professionals at banks and non-banking financial institutions (NBFIs) surveyed said they would...
Read more →The rate of data encryption following a ransomware attack in healthcare was the highest in the last three years, according...
Read more →