To say it’s been an eventful few years for supply chain risk management would be a massive understatement. From delays and disruptions to complete ceases in activity, supply chains have seen it all. While this chaos sparked a tremendous amount of innovation around supply chain technology – which is a positive thing – it also created a vast world of new opportunities for cyber criminals.Continue Reading →
Let’s start with the basics. What exactly is outsourcing cybersecurity? Outsourced cybersecurity is when an organization enlists the support of an outside third-party to manage a range of sophisticated security needs, including network security, operational security, application security, and information security. This can be a daunting undertaking for many companies, which is why the use of...Continue Reading →
And Why is Identity-Bound Biometrics Different?Continue Reading →
Moving away from the password-based authentication method is a step in the right direction – but the answer isn’t always straightforward. Unfortunately, most passwordless options take a step backwards in terms of security by relying on tokens, devices or phones to execute the authentication process as a single factor. The core challenges with these methods include:Continue Reading →
As we approach the end of the year, many organizations and employees alike are beginning to wind down for the upcoming holiday season. Those living in the United States can look forward to large potluck dinners and family gatherings for the upcoming holiday – Thanksgiving.
However, what makes Thanksgiving a “Thanksgiving dinner” is the classic dishes that are served throughout the night:...Continue Reading →
Compromised credentials cause 61% of today's data breaches.1 Most of these data breaches stem from organizations using shared workstations, commonly done so by bank tellers, contact centers, hospitals or manufacturing facilities.
What is common amongst these businesses that have shared workstations is that they're in industries that are responsible for storing sensitive user data....Continue Reading →
Tags: cybercriminals, identity bound biometrics, Shared Workstations
By now, most organizations, across industries, understand that passwords are a cybersecurity risk and potential point of vulnerability - and for good reason. According to the World Economic Forum, weak and/or stolen passwords are the most common initial attack vector, representing 80% of all breaches. The response, however, is positive: 82% of business leaders say they are ready and willing to...Continue Reading →