Secure Your Accounts Using App-Based Authentications
By: Alex Weinert In my blog Your Pa$$word doesn’t matter, I laid out the key password vulnerabilities, and in response to […]
By: Alex Weinert In my blog Your Pa$$word doesn’t matter, I laid out the key password vulnerabilities, and in response to […]
By Puja Mahendru The outbreak of COVID-19 has put cyberattacks on healthcare providers into hyperdrive. Factors contributing to such attacks include,
If you use Microsoft Outlook every day—especially for work—then you already know how much time you spend writing emails and
Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen Business and IT Cadence There is no refuting, the
Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen What is IT Sourcing and Why Is It Important?
Earlier this week, we published an article headlined “If you connect it, protect it.” The TL; DR version of that
The Technological Revolutions Alaska Air’s CIO, Varesh Sita, was quoted, “Alaska views itself as a tech company with wings.” Why
by Paul Ducklin Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole
Younghoo Lee is a Senior Data Scientist at Sophos. Together with Joshua Saxe, Sophos Chief Scientist, he recently presented these findings
Here’s an email phishing scam that our own security team received themselves. Apart from some slightly clumsy wording (but when