Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 10.8: Rapid World Cat Update with Joseph South

From Around the World in 8 Passwords to Watchtower Weekly, we have a packed-out show for you today! 🌎 🏰 Tune in as we discuss how Apple and Google are working together to limit AirTag stalking and Apple’s first ever ‘rapid’ security update. We're also joined by the host of the Security Unfiltered podcast and Principal Cloud Security Engineer, Joseph South. If the cloud is your jam, kick back and settle in as we cover good cloud security, the challenges facing cloud engineers, and much, much more! ☁️

The Pros and Cons of a VPN

The primary benefit of a Virtual Private Network (VPN) is that it keeps your information and identity private when using the internet to access sites or servers, download files and more. This is especially important when handling sensitive information on public networks, like checking your bank account at the airport or accessing work files remotely. There are a number of use cases, from personal device security to maintaining safe business networks, which we will cover in this article.

Unleashing the Power of Passphrases: Authentication That Is Secure and Memorable

The National Institute of Standards and Technology recommends using longer passphrases instead of passwords for authentication purposes. Passphrases improve an organization’s security posture and reduce the risk of data breaches: they are more complex, easier to remember, and more resistant to cyber-attacks.

Keeper for Teams and Small Business 3 Minute Demo

Introduction Keeper eliminates the pain of having to remember passwords while protecting your business from password-related data breaches and cyberthreats. Keeper stores and protects your website passwords, financial information and other sensitive documents in an encrypted vault. Keeper can generate unique, secure passwords for you that you can unlock with a single Master Password. Keeper makes it easy to login to websites without having to remember passwords ever again.

What Is PAM in Cybersecurity?

Privileged Access Management (PAM) in cybersecurity is how organizations manage and secure access to highly sensitive accounts, systems and data. Without PAM, organizations are at greater risk of a cyberattack impacting privileged accounts. Continue reading to learn more about PAM and its crucial role in cybersecurity.