From the Fall 2021 Issue

Trade-Offs of Convenience: Social Logins, Password Managers and Other Single Points of Failure in User Authentication

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Trade Offs of Convenience

As every experienced CSO understands all too well, security is a continuous exercise in evaluating and balancing a nexus of trade-offs between risk, cost, and user experience. This calculation becomes especially tricky when it comes to weighing the trade-offs between how to properly authenticate a user and do so without degrading their experience. If you … Read more

From the Fall 2021 Issue

How to Manage Challenges of Cloud Migration and Microsoft Vulnerabilities

Author(s):

Chris Jordan, CEO, Fluency Security

How to Manage Challenges of Cloud Migration & Microsoft Vulnerabilities

As a leading provider for users looking to rely on cloud and SaaS services, Microsoft clearly has a huge presence spanning nearly every industry and geography. However, many users are unaware of the additional services needed to protect cloud-based data. Since Microsoft only offers security services as premium add-ons, there is a lack of clarity … Read more

From the Fall 2021 Issue

The Cyber-Hygiene Mantra

Author(s):

Chuck Brooks, President , Brooks Consulting International

The Cyber Hygiene Mantra

National Cybersecurity Awareness Month is a good time for everyone to review the importance of the basics of defending their data and devices from cyber-attackers. Cyber-hygiene is a starting point to build those fortifications. Back in 2017, Congress passed legislation (HR3010) called “Promoting Good Cyber Hygiene Act of 2017”.  It was introduced to implore the … Read more

From the Fall 2021 Issue

The Ardennes, Again

Author(s):

David W. Archer, PhD, Principal Scientist, Galois, Inc.

Thin Red Line

Zero-Day, Zero Trust, and the 99th Infantry Division  Zero Day December 16, 1944. Unexpected Allied success after D-Day led to a thin defensive line in the Ardennes forest. Armed with that knowledge and suspecting weakness in the Allies’ resolve, Hitler swung his last big hammer in an attempt to shatter the alliance and force a truce. … Read more

From the Fall 2021 Issue

The Most Financially Devastating Form of Cyber-Attacks Can be Thwarted for Free

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

The Most Devastating Form of Cyber Attacks Can be Thwarted For Free

As ransomware continues to grab most of the headlines in cybersecurity, it’s easy to lose track of the much larger threat of Business Email Compromise (BEC). According to the FBI’s 2020 Internet Crime Report, the Internet Crime Complaint Center (IC3) received 2,474 complaints of ransomware that resulted in $29.1M in financial loss.[1] While it is … Read more

The Dynamic Duo: Data Breaches And Employers

Author(s):

James Keenan, Automation and Anonymity Evangelist, Smartproxy

Your data and employers

Before you fill out your next employment form, look at it and assess how much of your personal information you are handing over. Your full name, where you studied in college, your home address – this is just a snippet of the information employers request from us.  You always hear tips about staying private on … Read more

From the Summer 2021 Issue

Zero Trust: Is It All It’s Cracked Up To Be Or Is It Hype? Or A Bit of Both?

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Zero Trust

Few enterprise security technologies have garnered as much attention and hype as Zero Trust over the past decade. Yet, despite all the buzz, there remains a great deal of confusion and uncertainty in the market – is Zero Trust a framework, a reference architecture, or an actual technology? Does the Zero Trust model match the … Read more

Alternatives to Browse the Internet More Securely

Author(s):

Rina Richell, SEO Analytics Manager,

Browse Internet Security illustrate security concept

Browsing the internet can expose your business to a wide array of security risks. In a single browsing session, you can expose your search preferences, activate cooking and tons of other tracking techniques, and even reveal sensitive information on your computer. Additionally, all these can happen even when you’re visiting a reputable site. Regardless of … Read more

Holiday Shopping: How to Stay Safe and Protected

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

holiday shopping cozy christmas

With Christmas just around the corner and amidst a global pandemic, holiday shopping is at an all-time high. You click a few buttons and wham! You have Christmas delivered right to your door! Exciting stuff, I know. However, in order to keep holiday shopping exciting (and safe!), you must practice vigilance! Cyber-criminals are stronger today … Read more