Category: Blogs

Combating phishing attacks with passwordless FIDO2 authentication

Combating phishing attacks with passwordless FIDO2 authentication

Attackers predominantly use phishing attacks to steal and misuse user identities. A global Statista study on employee-reported malicious emails revealed that in the first quarter of 2023, 58.2% of malicious emails were credential theft attacks, 40.5% were impersonation attacks, and 1.3% were malware deliveries. Phishing attacks create a sense of urgency and panic in users, who, as

Read More
Cybersecurity KPI metrics that CISOs should track.

Cybersecurity KPI metrics that CISOs should track.

Chief information security officers (CISOs) need to track certain metrics to gauge the efficiency of their SOC and to see how effectively they’ve achieved their goals. This helps them perceive how the security function has progressed in each of the metrics over time. Cybersecurity KPIs will also help CISOs benchmark against industry standards and understand

Read More
Building a resilient IT infrastructure: Where do enterprises start?

Building a resilient IT infrastructure: Where do enterprises start?

The shift towards hybrid work models has expanded the perimeters of work, adding to the burden on IT teams as they fight to stay resilient in the face of increased attack surfaces. All it takes for an invasion into an enterprise’s IT infrastructure is one compromised identity.  So, what are enterprise identities? These are the

Read More
1 2 3 4