ProcessBolt

Single Sign-On: Balancing Power and Responsibility

Author(s):

François Amigorena, Founder and CEO, IS Decisions

Single Sign-On: Balancing Power and Responsibility

Single Sign-On (SSO) is a powerful productivity tool for organizations today. Facilitating access to on-premises and cloud-based applications, it dramatically simplifies the user experience. With SSO, users simply logon once, open a web browser or portal application, and open any and every application provisioned for them by IT.  But as Peter Parker’s Uncle Ben taught us “with … Read more

Even Cyber Pros Fall Victim to Cybercrime and Bad Habits

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

Cyber Pros Fall Victim to Cybercrime

Back in January of 2021, you may have seen this eye-catching headline: “Hackers are targeting security researchers”. As it turns out, threat actors in North Korea were luring pen testers and other vulnerability professionals into a trap where a backdoor was installed on unsuspecting researchers’ operating systems. This scheme was discovered by Google’s Threat Analysis … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more

How to Set up Two-Step Verification on Your Social Media Accounts

Author(s):

Mary Steinford, ,

Two-Step Verification

One of the most remarkable developments in the consumer technology industry in the past two decades is the emergence of social media networks. Social media has revolutionized the sort of social connections and interactions we have offline. Additionally, it has enhanced how we communicate and stay informed. Nowadays, billions of people around the world use … Read more

The Top 5 Cybersecurity Myths That Need to Die

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity Myths Man in Suit Looking at a White Wall With Two Direction Arrows Pointed To Fact or Myths

Cybersecurity myths are pervasive ideas people have about cybersecurity that weaken your cybersecurity posture. These myths often are defense mechanisms, rationalizations for apathy and inaction. It is important to dispel these myths. Otherwise, you could be opening yourself, or your business, to vulnerability. Cybersecurity Myth #1: Cybersecurity is the IT Guy’s Problem If you work … Read more