
How Identity-as-a-Signal is the Secret to Protecting Against Credential Compromise
When malicious actors get administrator access in an Active Directory (AD) environment, illicit activity can be extraordinarily difficult to detect or prevent. Earlier this month, Plurilock Solutions Architect Joel Eng

How Identity-as-a-Signal is the Secret to Protecting Against Credential Compromise
When malicious actors get administrator access in an Active Directory (AD) environment, illicit activity can be extraordinarily difficult to detect or prevent. Earlier this month, Plurilock Solutions Architect Joel Eng

How Identity-as-a-Signal is the Secret to Protecting Against Credential Compromise
When malicious actors get administrator access in an Active Directory (AD) environment, illicit activity can be extraordinarily difficult to detect or prevent. Earlier this month, Plurilock Solutions Architect Joel Eng
Previous

Identity in Cybersecurity Ep. 3 — The Never-ending Chain
What are we missing in the bigger cybersecurity picture—beyond the systems, technologies, best practices, and zero-day exploits that occupy so

Identity in Cybersecurity Ep. 2 — Follow the Data
How is our understanding of cybersecurity changing as technology becomes more central to society? What do these changes mean for

Here’s How to Secure Your Organization in the Unexpected Work-from-home Era
How is your office holding up to the new work-from-home reality? If yours is like most other offices right now,

Identity in Cybersecurity Ep. 1 — Walking the Security and Convenience Tightrope
How have the threats in cybersecurity changed over time? How secure is data access today compared to 10 years ago?

These Four Stories Show Why YubiKey Shouldn’t Be Your First—or Only—MFA Solution
A key part of our business at Plurilock involves helping companies to move beyond the multi-factor authentication infrastructure that they

Banks and Financials Are at an MFA Crossroads, and $5.2 Trillion Is at Stake
Accenture says that over $5.2 trillion in value will be lost in the financial services sector over the next five

Princeton Study Shows SMS Authentication Flows Are Just as Vulnerable as We Said They Were
Not a lot has changed since our post last year about the dangers of using SMS in two-factor authentication (2FA)

Canadian Medical Company LifeLabs Gets Hacked—and There Are Lessons in It for Everyone
Earlier this month, LifeLabs—a medical testing laboratory used by millions of patients and their physicians—announced that it had become the

CCPA is Coming, and Your Authentication Practices Matter
The California Consumer Privacy Act, enacted in 2018, goes into effect on January 1st, 2020—and imposes the strictest requirements in North

YubiKey, Google Titan, RSA SecureID, and More: Seven Authentication Token Families Compared
At their best, hardware tokens offer an alternative to the particular security, convenience, privacy, and cost issues that accompany phone-based

Non-repudiation is Becoming Important in Cybersecurity—But Choose a Strong Solution
Internal actors are implicated in more than a third of recent data breaches. If you're an IT or security professional

Many Continuous Authentication Solutions Aren’t What They Claim to Be
As "zero trust" picks up cybersecurity steam, more and more companies are considering continuous authentication solutions. This trend will likely

If You’re Pursuing Robotic Process Automation, You May Need Behavioral Biometrics
Robotic Process Automation (RPA) is taking enterprise computing by storm. As something like a cross between machine learning and old

NIST’s Draft Zero Trust Standard Calls for Continuous Authentication
Zero trust is rapidly becoming a cybersecurity best practice, and to buttress this point, the US National Institute for Standards

Yes, There Is a Phishing Solution That Doesn’t Make Logins Hard
Phishing has been with us for many years now—almost as long as the problem of email SPAM itself. Of course,

Massive Breach Shows That Not All Biometric Technologies Are Equal
The security web is abuzz with details about another massive breach. This time, 27 million data records stored in Suprema,

Two-Step Authentication is Not Two-Factor Authentication
Your team, your regulators, your clients, and the cybersecurity pundit class have all been telling you for some time now

Why Plurilock Products Are a Step Ahead of Competing Solutions
Behavioral biometrics is enjoying something of a boom over the last year or two. Analysts now predict a large role