.
HomeSecurity

Security

Drilling Down

Disaster Recovery (DR) plans and responders must look at the hidden or next-level ramifications...

Operational Resilience Impacts on BCDR

Depending on the industry vertical a person works in, the term “operational resilience” may...

Use Identity Threat Detection and Response to Better Prepare for Cyberattacks

Security and risk management (SRM) leaders must add identity threat detection and response (ITDR)...

The growing potential of behavioral biometric authentication

Behavioral biometrics has become an essential method of authenticating online users, yet its use...

Hacked! How to Mitigate the Impact of a Cybersecurity Incident

Discovering that your company has fallen victim to a cyber-attack can be a distressing...

The long and lingering death of passwords

Almost two decades ago, Bill Gates predicted the death of passwords during a talk...

Why passkeys are replacing passwords for digital sign-ins

Passwords have been around since the 1960s and represent the primary means by which...

Hot Topics