54% of SMBs do not implement MFA
SMB owners across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small Business Multi-Factor Authentication (MFA) Study released by the Cyber Readiness Inst.....»»
How APTs target SMBs
Small and medium businesses (SMBs) are not exempt from being targeted by advanced persistent threat (APT) actors, according to Proofpoint researchers. By analyzing a year’s worth of APT campaign data they collected from the 200,000+ SMBs that have.....»»
California seeks U.S. approval to end gas-only new-vehicle sales by 2035
The California Air Resources Board, which approved the plan in August, asked the Environmental Protection Agency on Monday to approve a waiver under the Clean Air Act to implement its new rules......»»
California seeks U.S. approval to end gas-only new vehicle sales by 2035
The California Air Resources Board, which approved the plan in August, asked the Environmental Protection Agency on Monday to approve a waiver under the Clean Air Act to implement its new rules......»»
The Supreme Court Needs the Judicial Reforms We Champion for Everyone Else
The U.S. should implement the same reforms to its high court that it has called for in other nations, a judicial reform scholar suggests.....»»
Passage by 1Password brings passkeys to any website
1Password has launched Passage by 1Password — a standalone authentication solution that enables businesses to implement passkeys for apps and websites. Passage by 1Password allows businesses to eliminate the hassle of passwords and reduce cart aban.....»»
Keeping California"s oil in the ground will improve health but affect jobs, find study
As society reckons with climate change, there's a growing call to keep fossil fuels right where they are, in the ground. But the impact of curtailing oil production will depend on the policies we implement to achieve this......»»
Intruder launches continuous attack surface monitoring for SMBs
Intruder has launched its continuous attack surface monitoring capabilities. The company’s new premium plan offering takes vulnerability management to the next level with continuous coverage, increasing visibility and transparency of external attac.....»»
Study finds steep 66% drop in party registration with automatic voter registration
In 2016, Oregon became the first state to adopt and implement an automatic voter registration (AVR) system. Now, twenty-two states, plus Washington D.C., have such systems in place. Early research on the impacts of this innovation has shown an increa.....»»
5 API security best practices you must implement
As outside economic pressures continue to shape how organizations think and allocate resources, data security continues to be a high priority. Due to their dependence on data to innovate and reduce expenses, many businesses are significantly more exp.....»»
My iOS 17 wish list: FaceMails, expanded Tapbacks, more
I do realize that it is far too late in the year to make a wish list that might get any traction re: things I’d like to see Apple implement into iOS 17, and that’s fine – I don’t care – but I have to document my hopes and dreams as a consu.....»»
Week in review: 5 free online cybersecurity resources for SMBs, AI tools might fuel BEC attacks
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Balancing cybersecurity with business priorities: Advice for Boards In this Help Net Security interview, Alicja Cade, Director, Financial Services,.....»»
5 free online cybersecurity resources for small businesses
As cyberattacks increase in frequency and sophistication, small and medium-sized businesses (SMBs) become more vulnerable to cyber threats. Unlike larger enterprises, SMBs often lack the financial and technical resources to secure their networks and.....»»
Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes
In this Help Net Security video, Michael Peters, Principal Software Engineer at Red Hat, discusses how to implement a zero-trust system that uses workload identity across a service mesh in Kubernetes to provide explicit authorization between services.....»»
Cerbos Cloud manages and enforces authorization policies
Cerbos has released Cerbos Cloud, a managed service offering for Cerbos. Cerbos is an open source authorization layer to easily implement roles and permissions in software applications. It separates authorization logic from the core application code,.....»»
Industrial Defender launches Phoenix to secure SMBs operations
Industrial Defender has unveiled the launch of Phoenix, an OT security solution tailored to the needs of SMBs. Phoenix is revolutionizing how smaller industrial organizations approach OT security by providing visibility into all their OT assets and t.....»»
ImmuniWeb unveils major updates to its AI platform
To help customers stay ahead of the emerging cybersecurity threats, fulfill regulatory and compliance requirements, and implement intelligent automation to accelerate internal processes and reduce operational costs, ImmuniWeb has unveiled many update.....»»
1Kosmos integrates with ForgeRock to add biometric passwordless authentication to apps
1Kosmos has unveiled the integration of 1Kosmos BlockID with ForgeRock Access Manager which enables customers to modernize the onboarding experience for users and implement identity-based passwordless authentication on all ForgeRock protected applica.....»»
PayPal has a whole load of tools to help your SMB rake in more sales
SMBs can be more competitive by offering Apple Pay, card remembering, and automatic updating added to PayPal......»»
Lack of security employees makes SMBs sitting ducks for cyber attacks
For SMBs (and startups in particular), breaches can be devastating, according to DigitalOcean. To strengthen their cybersecurity posture, companies must spend valuable resources on maintaining or updating systems, hiring and training staff, and imple.....»»
Balancing security risks and innovation potential of shadow IT teams
Shadow IT teams, also known as rogue IT teams, have grown in popularity in recent years due to the rise of cloud-based apps and remote work. However, this has led to operational tension and security risks within many businesses. 58% of SMBs have expe.....»»