Part one of this two-part article series examines password spray, credential stuffing, and man-in-the-middle attacks and techniques and tools for mitigation
What are the most prominent identity-based attacks and how are they carried out? And how can security teams leverage identity technologies to mitigate those attacks and reduce their organizational risk?
The Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) have released an advisory on top malware strains in 2021.
One-third of organizations experience at least one ransomware attack per week, with 9% of enterprises experiencing one daily, according to a report from Menlo Security.
Researchers at the University of Florida and other collaborators are working to understand how inequity in tech and cybersecurity design affects marginalized populations.
Learn about the five main types of voice scams that can lead to data breaches, security vulnerabilities and loss of productivity for enterprise security.
Managing enterprise identities in a multi-cloud environment presents a challenge to cybersecurity leadership. Discover identity and access management (IAM) best practices here.