How to stop the leading security threat: Identity-based cyberattacks
Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.
5 ways businesses can improve information security
Adoption of stronger identity authentication, up-to-date awareness training, and a data-driven approach to combating cyberthreats are among the top investments that businesses can make for their cybersecurity programs.
Why Microsoft's Vasu Jakkal sees cybersecurity as a 'symbol of hope'
The Microsoft security executive told Protocol that she’s driven by the potential to help people feel safe in their digital lives.
SPONSORED CONTENT
What cybersecurity executives would do with a blank check
Many leaders say they'd use their blank check to instill a security-first culture or bring in new talent.
How major security incidents have evolved over the last six years
In Protocol’s data analysis of the changing cyberthreat landscape, attacks using stolen credentials are on the rise, while phishing risks are down.
To give you the best possible experience, this site uses cookies. If you continue browsing. you accept our use of cookies. You can review our privacy policy to find out more about the cookies we use.