Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for…
Read More
Quantum computing is still cutting-edge, but that doesn’t mean it can’t be improved. What is quantum computing? Is it the same as quantum cryptography, a central tenet of so-called quantum security? And where does artificial intelligence (AI) fit in? What Is Quantum Security? Often when you hear about quantum computing…
Read More
It’s time to look at the industry skills gap differently. More and more digital native young people could potentially be coming into the industry with the right skills, but several elements block their progress. Professionals already in place need to smooth the road for them. That might involve changing some…
Read More
Privileged access management (PAM) is in a bizarre place right now. On the one hand, organizations mostly understand the value of PAM. In a July 2019 study cited by Forbes, for instance, just 1% of respondents said that they don’t use any kind of PAM. More than eight of 10…
Read More