Want to stop hackers from using phishing as leverage to get into your IT environment? Start using phishing-resistant multifactor authenticators such as hardware keys and identity verification cards. That's the advice of the U.S. National Institute for Standards in Technology (NIST). "Not every transaction requires phishing resistant-authenticators," the agency said in a blog last week. "However,
Who would have thought that a simple phone number would become the gateway for cybercriminals? However, it is so. Let's go in order. For a few years (and
Three hundred and sixty-five days of angst is a good description of the job of an infosec pro. Whether working for a well-funded bank or a fledgling startup, IT security professionals are exhausted every day. So for a holiday gift they need escapism. Here are a few suggestions for what to get the infosec pro
Are you worried that someone could hack into your Twitter account? Then here’s how you can enable two-factor authentication to help make your account extra secure.