In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and ...
Halo Security, a leader in external attack surface management and penetration testing, has announced the launch of its new Slack® app, empowering cybersecurity teams to receive real-time alerts on ...
Discover how Sentient IAM fills the gaps in Agile and Zero Trust, driving leadership, culture, and alignment to elevate business performance in 2025. The post Beyond Agile: Why Sentient IAM Is the ...
Attackers continually refine their methods to compromise user identities and gain unauthorized access to sensitive systems.
Financial services are at the crossroads of innovation and threats from ever-more sophisticated cybercriminals. “In my 25 ...
Nile is working to make Local Area Network (LAN) invulnerable by design; its latest effort to stop ransomware and lateral movement attacks. The ...
Over half of the most routinely exploited vulnerabilities worldwide in 2023 affected network devices and infrastructure, according to a cybersecurity advisory issued by CISA and other international ...
Director, Product Management, at Auvik. Glenn Gray is a former IT practitioner, Help Desk leader, and MSP vCIO. He transitioned to Product Management & Marketing roles after an MBA focused on IT ...
For small and mid-size businesses (SMBs), balancing IT and security resources can be both challenging and essential.  With ...
Key takeaways from highly experienced industry experts on how to scale application security from the panel in Track 1 of The Elephant in AppSec Conference.
Explore NIST-backed guidance on securing Non-Human Identites, reducing risks, and aligning with zero trust principles in cloud-native infrastructures.
U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front ...