Why Minimizing Human Error is the Only Viable Defense Against Spear Phishing

Phishing attacks have become one of the business world’s top cybersecurity concerns. These social engineering attacks have been rising over the years, with the most recent report from the Anti-Phishing Working Group coalition identifying over 266,000 a…

Read more

Why Minimizing Human Error is the Only Viable Defense Against Spear Phishing

Phishing attacks have become one of the business world’s top cybersecurity concerns. These social engineering attacks have been rising over the years, with the most recent report from the Anti-Phishing Working Group coalition identifying over 266,000 a…

Read more

Cynet Offers Free Threat Assessment for Mid-sized and Large Organizations

Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the standard process of 3rd party threat assessment as practiced today is both time consuming and expensive.

Cynet changes the rul…

Read more

OpenSSH now supports FIDO U2F security keys for 2-factor authentication

Here’s excellent news for sysadmins. You can now use a physical security key as hardware-based two-factor authentication to securely log into a remote system via SSH protocol.

OpenSSH, one of the most widely used open-source implementations of the Sec…

Read more

OpenSSH now supports FIDO U2F security keys for 2-factor authentication

Here’s excellent news for sysadmins. You can now use a physical security key as hardware-based two-factor authentication to securely log into a remote system via SSH protocol.

OpenSSH, one of the most widely used open-source implementations of the Sec…

Read more