
When Stolen Credentials are $7,100 a Set, You Need Behavioral Biometrics
The Register recently reported that initial access brokers are doing a brisk business following the work-from-home push of 2020. Among the items that they note are: Stolen credentials going for

When Stolen Credentials are $7,100 a Set, You Need Behavioral Biometrics
The Register recently reported that initial access brokers are doing a brisk business following the work-from-home push of 2020. Among the items that they note are: Stolen credentials going for

When Stolen Credentials are $7,100 a Set, You Need Behavioral Biometrics
The Register recently reported that initial access brokers are doing a brisk business following the work-from-home push of 2020. Among the items that they note are: Stolen credentials going for
Previous

With Behavioral Biometrics, IAM Meets DFIR
Modern DFIR practices and processes bring a whole slew of systems, data sources, and types of expertise to bear in

Identity in Cybersecurity Ep. 9 — Reducing the Noise
How do you prevent juggling thirty disparate security tools? Do you find it hard to correlate relationships between massive amounts

Identity in Cybersecurity Ep. 8 — The Visibility Issue
How do you source cybersecurity talent? Which skills or certifications actually make the best hires? In this episode, Plurilock CEO

Introducing Our Q4’20 Release—With Scalability, Proxy, and Support Enhancements
Over the second half of 2020, we've been privileged to have received a good deal of valuable feedback from our

Eight Security Capabilities Enabled by a Continuous Identity Signal
As a continuous identity solution, Plurilock DEFEND is able to provide a real-time signal that confirms the identity of the

As SSO Becomes Standard, A New Best Practice is Needed
Single sign-on (SSO) and identity-as-a-service (IDaaS) platforms are rapidly becoming standard tools across the business world—and with good reason. As

Identity in Cybersecurity Ep. 7 — Pushing Security to the Edges
How should organizations be thinking about identity and access management today? In this episode, Plurilock CEO Ian L.Paterson talks with

Identity-as-a-signal Will Rewrite the Rules in Identity and Access Management
CISOs today are scrambling to cope with a multiplying universe of systems and access management scenarios. The typical enterprise hosts

Identity in Cybersecurity Ep. 6 — Through a Holistic Lens
How do you adequately authenticate a person, device, or organization? In this episode, Plurilock CEO Ian L.Paterson talks with Joni

Unlike Behavioral or Biometric Authentication, Behavioral Biometrics Is Privacy-friendly
In recent years, both biometric authentication and behavioral authentication have increased in popularity as advances in technology have made them

Identity in Cybersecurity Ep. 5 — Getting Your Arms Around the Root of the Problem
What happens when organizations don’t have identity management practices and systems in place, and what can be done to solve

It’s 2020 and Passwords Should No Longer Be a Problem
Fifteen years ago, password policies started to look something like this: At least ten characters. At least one capital letter,

Announcing Our Summer ’20 Release of ADAPT— Now with SAML and OpenID Connect
Plurilock released ADAPT, our invisible login MFA product, in early 2019. Based on the same science that lies behind our

Identity in Cybersecurity Ep. 4 — Seeing the Big Picture
As a cybersecurity professional, how do you balance privacy and transparency? How about equality and diversity? Security and usability? How

Especially During COVID, MFA Remains a Challenge to Deploy
By now, the stat is well known. At RSA, Microsoft reported that 99.9% of credential-driven data breaches involve accounts that

Why Most “Passwordless” Authentication Solutions Aren’t Actually Passwordless
Authentication is already a modern necessity, and passwordless authentication is fast becoming one. Let's take a moment to review why,

Give This WFH Security Hygiene Checklist to Your Employees
This year an unprecedented proportion of the world's workforces have transitioned to full-time remote work, a shift dictated by facts

Identity in Cybersecurity Ep. 3 — The Never-ending Chain
What are we missing in the bigger cybersecurity picture—beyond the systems, technologies, best practices, and zero-day exploits that occupy so