Futurum principal analyst Shelly Kramer talks about the new cybersecurity threats stolen session cookies introduce to the malware-as-product marketplace and why relying on MFA is not the panacea some might think.
TeleSign Silent Verification Service Launches, Designed to Reduce Multi-Factor Authentication Headaches for Mobile Users
Futurum Analyst Michael Diamond explores how the TeleSign Silent Verification offering will help eliminate headaches for businesses and consumers using their smartphones to authenticate into online retailers, social media, healthcare services and more — and why that matters.
Future Quantum Computing Hackers Thwarted by New OpenSSH Encryption Security Features That Prevent Capture Now, Decrypt Later Attacks
Futurum analyst Todd R. Weiss examines how newly-incorporated OpenSSH 9.0 encryption security features aim to prevent future quantum computing hackers from using the powerful quantum computers of tomorrow to defeat the strongest data security algorithms of today.
The Apple Meta Hack — Breaking Down How It Happened and Exploring Some of the Cybersecurity Dangers Ahead
Futurum analysts Michael Diamond and Shelly Kramer explore the social engineering attack on Apple and Meta. They review how it happened, who the suspected perpetrators are (and how rampant these gangs are), as well as some of the cybersecurity dangers that are quite likely ahead.
Why Enterprises Must Be More Proactive With Security Strategy
Sure, we hear about hacks when they happen to Sony, Target, or the federal government, but those are just a small percentage of the total that actually occur annually. Enterprises are hacked all the time and those numbers continue to grow; in 2015, the number of cyber attacks each month was higher than the months of the previous year (other …
IT Security Needed More Than Ever For SMEs
It’s hardly a secret when a large corporation gets hacked—it’s the opposite, actually. News of controversies and scandals for big business spreads quickly (like the recent Target and Ashley Madison data breaches). Just because they sometimes don’t make the front page, it’s important to remember that smaller scale breaches do happen and happen often. In fact, small to medium enterprise …
Keeping Data Safe in the Cloud is Every IT Team’s Goal
Here’s something that I hear all the time and I’m sure you do as well: “The future of business is cloud technology.” A decade ago, the pundits and prognosticators who uttered these words may have had been considered visionaries, but today, cloud is not only the future, it’s very much the present. As those of us in the tech space …