Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Decentralized Identity and Verifiable Credentials Travis Spencer, Curity's CEO; Jacob Ideskog, Curity's CTO A paradigm shift is upon us. It will put users in control of who they share their identity data with. By certifying this identity data as a “credentia... June 8, 2023 2:00pm Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... 5 days ago | 25 mins Cyber Notes Cast - The Biggest Vectors of Cyberattacks in SMEs senhasegura Small and medium-sized enterprises usually do not make or have the capacity to make large investments in digital security, which makes them vulnerable... June 7, 2023 3:00pm Cyber Notes Cast - Security Training Best Practices for Privileged Users senhasegura It is essential to train privileged users to avoid cyber threats, as they are the primary victims of hackers. Read our article and learn how to do it.... 3 days ago | 4 mins Cyber Notes Cast - The Main Types of Cyberattacks in Cloud Environments senhasegura Cloud services facilitate the routine of companies and optimize their productivity, especially in the context of remote work. However, they can presen... June 9, 2023 3:00pm Cloud security: Does the endpoint still matter? Anton Ovrutsky, Senior Threat Researcher (Sumo Logic) & Megan Roddie, Senior Security Engineer (IBM) Today, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically? There ar... 5 days ago | 55 mins A Look at Password Spraying Attacks and the Role of Weak Passwords Jeremy Dundon, Solutions Engineering Manager at Netwrix Misused credentials are at the center of cyberattacks, used for gaining access, moving laterally, exfiltrating data, and more. Passwords can be obtain... 5 days ago | 92 mins DNS Security Risks and Systems: AN OPEN DEMO Peter LaMantia, Founder and CEO Phishing, malware, and credential theft are top cyber threats. Corporations spend millions to mitigate exposures, yet compromises continue to damage ... 5 days ago | 21 mins Cyber Notes Cast - Concepts of Federated Identity Management senhasegura Federated identity management enables authorized users to access multiple platforms using a single set of credentials. In the past, each website or a... June 12, 2023 3:00pm Phishy Business - Shining a Light on Bots: The Good and the Bad Cyril Noel-Tagoe, Kiri Addison In this episode of Phishy Business, we take a look at bots. Listen in to learn more about what bots are, and what they do. Also, learn what can make t... 6 days ago | 31 mins Load more