-
Reverse Proxies Are Killing Your MFA
If you’re old enough to remember landlines (or have seen any 1980s or 90s movie about teens looking to put one over on their parents), chances are your parents pulled a real-world man-in-the-middle attack (MITM) on you. There you were as a sneaky teenager plotting with a friend over the phone about going to a…
-
5 Types of Cybersecurity Your Organization Needs
Businesses don’t often compare themselves to nations, but they have at least one important thing in common – the need to handle threats across multiple spheres or environments. Nations must be on constant alert to security threats from land, air, sea, space and – increasingly – cyberspace. Depending on the complexity of your cyber infrastructure,…
-
ICYMI: How to Harden Your Security Posture by Maximizing Your Existing Security Tools (Webinar)
Security professionals need to be laser-focused on strengthening their security posture, but with huge attack surfaces and a multitude of ever-advancing threats, the challenge can sometimes seem insurmountable. However, by using the right tools coupled with a deep understanding of their most valuable business assets, security teams can create a winning strategy that protects their…