Mar 14, 2023New Report: Inside the High Risk of 3rd-Party SaaS AppsThis guest article was provided by Adaptive Shield Employees are granting third-party apps access to the company’s SaaS apps, especially...
Mar 13, 2023How Companies Can Can Prevent Multi-Factor Authentication AttacksMulti-factor authentication (MFA) is an effective way to enhance security by requiring multiple forms of authentication before granting...
Mar 10, 2023White House Budget Brings Big Fund Increases for CyberPresident Biden's budget plan proposes additional funding for cybersecurity-related spending, including $145 million for the...
Mar 3, 2023Security Experts Share What the White House National Cyber Strategy Means for Organizations (Part 2)Read part 1 of this White House National Cyber Strategy expert commentary series here. This week, the White House National Cyber Strategy...
Mar 3, 20233 Steps to Reducing False Positives to ZeroThis guest post was contributed by Doug Ennis, CEO of Waratek. False positives -- when a security system flags an event as a potential...
Mar 2, 2023CISA Director Jen Easterly: Make Software Manufacturers Liable for Insecure ProductsJen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), has called on Congress to create legislation that...