Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Protect Your Online Privacy

You can protect your online privacy by being aware of and cleaning your digital footprint; using strong, unique passwords for each of your accounts; not oversharing on social media; reading privacy policies carefully and more. Continue reading to learn more about online privacy and the steps you can take to protect yours.

Passkeys and the future of authentication: Q&A with Andrew Shikiar, CMO of FIDO Alliance

What are passkeys? How do they fit into a passwordless future? Why is user experience the key to adoption for passwordless? These are just a few of the questions people have for the FIDO Alliance – an open industry association that wants to reduce the world’s reliance on passwords.

Hello CISO - Episode 9: Practicing Good Breach Response

What makes a company successful at breach response? In a word, preparation. In this episode, Troy breaks down an historically bad example of breach response, and how to avoid a similar fate. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.

What to Do If Your Identity Is Stolen

There are several steps you should take after discovering your identity has been stolen such as getting a copy of your credit reports, contacting your credit card issuers and banks, reporting the theft to the FTC and placing a security freeze on your credit. Read on to learn more about identity theft and what you can do to mitigate the risks of having your identity stolen in the future.

How Executives Can Stay Safe From Cyberattacks

The C-Suite and other senior executives are frequently the targets of cyberattacks. As the most visible members of an organization, executives have access to sensitive information, influence inside the organization and a public platform, making them valuable targets for cybercriminals. Organizations of all sizes need to actively reduce risk for senior management.

Why You Shouldn't Turn Off 2FA

You shouldn’t turn off your Two-Factor Authentication (2FA) because it removes the extra layer of security it adds to your account, making it easier for cybercriminals to compromise it. Keep on reading to learn why 2FA should be left enabled for your online accounts and why it should be added to your accounts if it isn’t already.

How to Tell If a Website is Legit

The internet is used for just about everything in our lives: to pay bills, shop, stream movies, attend school, work remotely and more. Since we are now online more than ever, cybercriminals are always coming up with new ways to steal data. One way is by leading people to illegitimate websites, which is why it’s crucial that you know how to spot a legitimate site from a phony one.

Random but Memorable - Episode 10.2: Passwordless Future Chatbot Optimism with Andrew Shikiar

Goodbye, passwords. 👋 On the show today, we chat with Andrew Shikiar from FIDO Alliance to get the lowdown on all things passwordless and what it means for the future of authentication. In Watchtower Weekly, we discuss the hilarious but scary capabilities of a chatbot (aka ChatGPT) as well as a recent Reddit data breach. We also welcome back 1Password founder, Sara Teare, who is joining us as a new host! 🎉🎙