Tag: Cyber Threats

Security or Functionality? Security Risks with Digital Transformation

Digital transformation has been adopted by most companies from around the world, resulting in a more connected and innovative business…

6 years ago

Can an IAM solution prevent Credential Phishing?

The most common misconception regarding credential phishing is that it is people-driven and not organization-driven. Therefore, organizations tend to underestimate…

6 years ago

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

6 years ago

Beware of Credential Stuffing

In recent times, you might have noticed user accounts being compromised by the millions, and yet companies refute these claims…

6 years ago

3 Important steps to improve network security against brute-force attacks

A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…

6 years ago