Research, views, and insights on cybersecurity, account takeover, fraud, and more
Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!
Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.
NIST 800-63b password guidelines can improve user's experience with passwords, including the guideline to stop forcing periodic password resets for users.
Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.
The continued barrage of reports about data breaches and account hijacking, make it painfully clear that the way organizations are managing password-based security is missing something. When we look at how cybercriminal tactics have evolved, and how compromised credential attacks have impacted these methods, one answer to the problem of the password becomes clear.
How many of your users are using insecure and compromised passwords? You may have a standard password strength meter on your site so you may think that your users have secure passwords. Think again. Password strength meters and password complexity requirements are simply not enough.
Billions of user credentials (usernames and passwords) have been exposed publicly over the last few years. The natural question that comes up is “what do cybercriminals do with these stolen credentials?”