Bridging the Gap: The Challenge of Finding Cybersecurity Allies in the Midst of Crisis
In an era dominated by technological advancements, our dependence on digital infrastructure has never been more pronounced. However, with this increased reliance comes an elevated risk of cybersecurity threats, which
Bridging the Gap: The Challenge of Finding Cybersecurity Allies in the Midst of Crisis
In an era dominated by technological advancements, our dependence on digital infrastructure has never been more pronounced. However, with this increased reliance comes an elevated risk of cybersecurity threats, which
Bridging the Gap: The Challenge of Finding Cybersecurity Allies in the Midst of Crisis
In an era dominated by technological advancements, our dependence on digital infrastructure has never been more pronounced. However, with this increased reliance comes an elevated risk of cybersecurity threats, which
Previous
Princeton Study Shows SMS Authentication Flows Are Just as Vulnerable as We Said They Were
Not a lot has changed since our post last year about the dangers of using SMS in two-factor authentication (2FA)
Canadian Medical Company LifeLabs Gets Hacked—and There Are Lessons in It for Everyone
Earlier this month, LifeLabs—a medical testing laboratory used by millions of patients and their physicians—announced that it had become the
CCPA is Coming, and Your Authentication Practices Matter
The California Consumer Privacy Act, enacted in 2018, goes into effect on January 1st, 2020—and imposes the strictest requirements in North
Soft Token vs Hard Token Authentication: Seven Token Authentication Families Compared
At their best, hardware tokens offer an alternative to the particular security, convenience, privacy, and cost issues that accompany phone-based
Non-repudiation is Becoming Important in Cybersecurity—But Choose a Strong Solution
Internal actors are implicated in more than a third of recent data breaches. If you're an IT or security professional
Many Continuous Authentication Solutions Aren’t What They Claim to Be
As "zero trust" picks up cybersecurity steam, more and more companies are considering continuous authentication solutions. This trend will likely
If You’re Pursuing Robotic Process Automation, You May Need Behavioral Biometrics
Robotic Process Automation (RPA) is taking enterprise computing by storm. As something like a cross between machine learning and old
NIST’s Draft Zero Trust Standard Calls for Continuous Authentication
Zero trust is rapidly becoming a cybersecurity best practice, and to buttress this point, the US National Institute for Standards
Yes, There Is a Phishing Solution That Doesn’t Make Logins Hard
Phishing has been with us for many years now—almost as long as the problem of email SPAM itself. Of course,
Massive Breach Shows That Not All Biometric Technologies Are Equal
The security web is abuzz with details about another massive breach. This time, 27 million data records stored in Suprema,
Two-Step Authentication is Not Two-Factor Authentication
Your team, your regulators, your clients, and the cybersecurity pundit class have all been telling you for some time now
Why Plurilock™ Products Are a Step Ahead of Competing Solutions
Behavioral biometrics is enjoying something of a boom over the last year or two. Analysts now predict a large role
What Plurilock’s Defense Contracts Reveal About Authentication Today
Plurilock has just been awarded another government contract to develop new cybersecurity capabilities, this time for Canada’s Department of National
Zero Trust Means Zero Trust, Not “Trust All Recognized Users”
Lost in the shuffle of the "zero trust" marketing melee over the last several years is the very basic idea
Your “Zero Trust” Company May Be More Trusting Than You Imagine
What do you do when the corporate breach rate skyrockets? You lock things down. More and more tightly. Thus we
If You’re Not Using MFA, You’re Not Complying with Educational Data Protections
Health data and financial data are often at the center of data security discussions. Often forgotten but no less important
Podcast: Bank Attacks Put Password Insecurity Back in the Spotlight
Plurilock™ CEO Ian Paterson recently appeared on The Security Ledger podcast, Episode 145, to talk about the future of passwords
HIPAA and PIPEDA are More Strict About Authentication Than You Realize
Healthcare providers and related companies in the United States and Canada are required to comply with the Health Insurance Portability
Safeguard your company data.
Stop unauthorized downloading, uploading, copy-pasting, emailing, and sharing.