Zephyrnet Logo

Tag: multifactor authentication

MITRE ATT&CKED: InfoSec’s Most Trusted Name Falls to Ivanti Bugs

Chinese state hackers have used vulnerable Ivanti edge devices to gain three months' worth of "deep" access to one of MITRE Corp.'s unclassified networks.MITRE,...

Top News

CISO Sixth Sense: NIST CSF 2.0’s Govern Function

COMMENTARYCybersecurity leaders constantly are on the hunt for tools and strategies to navigate the complex landscape of digital threats. But despite consistently being held...

Beyond Identity Introduces Device360 for Security Risk Visibility Across All Devices

PRESS RELEASENEW YORK , Feb. 21, 2024 /PRNewswire/ -- Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, today announced the release of its new Device360 solution for continuous...

CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Data Privacy in Ecommerce: Emerging Trends and Best Practices for 2024

In 2024, protecting customer data is crucial for ecommerce businesses. However, recent large-scale data breaches, such as Casio’s breach, which hit their customers in 149 countries, have highlighted the need for better...

SEC X Account Hack Draws Senate Outrage

Following the Securities and Exchange Commission's X account, formerly known as Twitter, compromise on Jan. 9, two Senators have issued a statement calling the...

Mandiant, SEC Lose Control of X Accounts Without 2FA

Upon review, Google's cybersecurity operation at Mandiant has determined it temporarily lost control of its X account to cryptocurrency drainer malware operators on Jan....

Executing Zero Trust in the Cloud Takes Strategy

Zero trust is a high-level strategy that assumes that individuals, devices, and services attempting to access company resources, both externally and internally, can't automatically...

How Zero Trust Addresses the Unique Security Risks of IoT Devices

The increasing number of Internet of Things (IoT) devices makes everyday life easier and more convenient. However, they can also pose many security risks....

Why CISOs Need to Make Cyber Insurers Their Partners

In the current threat landscape, the relationship between cyber-insurance providers and potential (or even current) policyholders is often strained, at best. Organizations may perceive...

ISAs and the Dawning Hardware Security Revolution

The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security...

How to bolster security against intellectual property theft

Intellectual property theft is a major concern for all businesses, but especially organizations in the defense-industrial base because their IP is vital to national...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?