What We Are Reading
Article

Citrix Bleed Exploit: Protect Your NetScaler Accounts

Recently, there’s been a buzz in the tech world about a potential security risk known as the ‘Citrix Bleed’ vulnerability, officially labeled as CVE-2023-4966. This vulnerability affects Citrix NetScaler ADC and NetScaler Gateway appliances and could pose a significant threat to your online security.

Article

Cloud Privileged Access Management: Agent-Based Vs. Agentless

3. No Password: Agents can utilize passkey-like technology that depends on access to TPM/Secure Enclave for user authentication. 4. Offline Capability: Since the agents are installed on the endpoints, they can operate and enforce policies even when the ...

Article

How To Align Passwordless With Zero Trust

Organizations that assemble all the pieces of the puzzle effectively can tap passwordless to take security to a zero trust level.                     

Article

The Latest Enablers, Disrupters And Game-Changers In Authentication

From driver's licenses to employee badges, we’re all familiar with the idea of using a physical ID to verify our identities so we can transact safely.

Article

Five Ways To Use Cybersecurity To Build Your Digital Trust

Digital trust became a hot topic with progressing digitization. A Check Point report (via Infosecurity Magazine) found that in the first quarter of 2023, the global incidence of cyberattacks increased by 7% compared to the same time a year before.

Article

Website Development: A Beginner’s Guide

Website development is a crucial step for any small business looking to establish an online presence, and you need to get it right. After all, according to statistics, 75% percent of your website’s credibility comes from its design.

Article

Software Complexity Bedevils Mainframe Security

According to a Deloitte study, 71% of Fortune 500 companies continue ... The system has a plethora of security controls — such as user authentication and access controls, decentralized security administration, discretionary and mandatory access controls ...