News

blue outline of hand with finger pointing

Is your SSO login protected enough?

Today, many organizations use more systems than ever, spanning on-premises and cloud environments. As a result, employees are tasked with remembering more and more passwords as the number of systems and services continues to grow. Single Sign-On (SSO) is... Read More

arrows in circle

What’s new in PCI DSS V4.0

Organizations that store, process, or transmit cardholder data fall under the compliance framework known as PCI-DSS (Payment Card Industry Data Security Standard). It helps protect cardholders and businesses dealing with cardholder data from cyber attacks and breaches. The PCI... Read More

ad in circle

Password Managers with AD Integration: What to Look For

Organizations looking to manage passwords beyond the Active Directory password might choose to do so with an enterprise password manager. Organizations that run on Active Directory will have an AD integration at the top of their shopping list. So,... Read More

globe

Celebrate World Password Day with a password audit

May 5, 2022 marks the ninth anniversary of World Password Day, an event created by Intel to raise awareness about the importance of strong passwords. For more than 60 years we have relied on passwords to secure our personal... Read More

coding with lock

Virginia Consumer Data Protection Act

The Virginia Consumer Data Protection Act (VCDPA) was recently signed, making it the second state that has signed a consumer privacy regulation into law. This legislation follows what was implemented in California by way of the California Consumer Privacy... Read More

shield with checkmark

NIST MFA guidelines

End-user passwords are often the weakest link in IT security, providing the path of least resistance for an attacker looking to penetrate business systems. Users commonly choose easy to remember, and consequently, easy to compromise passwords. In IBM’s Cost... Read More

blue gears

NIST 800-63b Password Guidelines and Best Practices

The most basic form of authentication is the password. Despite many advancements in cybersecurity, the username and password, although outdated, are still used as the most common form of authentication today. Enterprise environments have long used password policies to... Read More