CISO Corner: The NYSE & the SEC; Ransomware Negotiation Tips

June 28, 2024 at 04:15PM Wireless providers prioritize uptime and lag time at the expense of security, leaving users vulnerable to attacks. At Black Hat 2024, Penn State researchers will reveal how hackers can exploit 5G to intercept Internet traffic, leading to spying and phishing. The researchers have reported vulnerabilities to 5G vendors, but a … Read more

Passkeys Are Cool, But They Aren’t Enterprise-Ready

October 13, 2023 at 04:38PM Passkeys, a passwordless authentication technology supported by major internet firms like Apple, Google, and Microsoft, offer a user-friendly solution for accessing websites and cloud applications. However, their usability does not meet the control and attestation requirements of large corporations. Passkeys are expected to be integrated into the existing public key … Read more