
Who is Lapsus$?
Who is Lapsus$? After claiming responsibility for high-profile attacks on major corporations like Microsoft, Okta, Samsung, Ubisoft, and NVIDIA at the beginning of 2022, the LAPSUS$ group made a significant

Who is Lapsus$?
Who is Lapsus$? After claiming responsibility for high-profile attacks on major corporations like Microsoft, Okta, Samsung, Ubisoft, and NVIDIA at the beginning of 2022, the LAPSUS$ group made a significant

Who is Lapsus$?
Who is Lapsus$? After claiming responsibility for high-profile attacks on major corporations like Microsoft, Okta, Samsung, Ubisoft, and NVIDIA at the beginning of 2022, the LAPSUS$ group made a significant
Previous

Cybersecurity Positions and the Need To Think Differently
Introduction In the 1993 film Rookie of the Year, coach Larry Fisher, thinking differently while fighting to save his club

Behavioral Biometrics and Passive Identity Authentication in Support of Zero Trust Architecture
A zero-trust security architecture has a minimized threat surface and more control over authentication and user access. It is a

Behavioral Biometric Systems: Privacy-Friendly, Less Risky, More Compliant, and More Secure
Many organizations today depend on digital services and data to run daily operations and ensuring the privacy of critical data

Zero Trust, the Workplace, and Post-COVID: 5 Questions Answered
Zero trust. Those two words are gaining ground as businesses continue to weather the pandemic. COVID-19’s sudden impact in 2020

U.S. Government Announces Zero Trust Requirement for Federal Agencies
On the heels of a White House memo published in mid-January, the Office of Management and Budget (OMB) has issued

Biden’s Memo Calls for Cybersecurity Improvements for National Security
Weeks into 2022, following a record-breaking year of more than 1,200 cyber attacks, President Biden’s White House has issued a

Cybersecurity Year in Review: Big Breaches, Ransomware & Zero Trust
In recent years there has been a significant increase in the number of cyber attacks, and 2021 was no different.

Cybersecurity Awareness Month and the Need for a Zero Trust Architecture
While we at Plurilock™ know that cybersecurity is a year-round effort, October marks the 18th annual Cybersecurity Awareness Month, bringing

Zero Trust and Privileged Access Management: NIST 800-207
Zero trust has been a long-known concept within the cybersecurity industry but has not, until recently, trickled out into the

The Existing Authentication Paradigm is Failing Us
The headlines make clear what many in the industry have long known to be true – cyberattacks are on the

Biden’s Executive Order on Cybersecurity Is a Needed Response to Growing Cyber Threats
Over the last year, we’ve seen a series of dramatic cyber-attacks on U.S. soil. Just three of these paint a

Plurilock™ Enables Critical Systems to Both Restrict and Guarantee Access at the Same Time, Seamlessly
Critical systems are a tricky problem in most organizations. They're not just critical because bad things will happen if they

How Identity-as-a-Signal is the Secret to Protecting Against Credential Compromise
When malicious actors get administrator access in an Active Directory (AD) environment, illicit activity can be extraordinarily difficult to detect

When Stolen Credentials are $7,100 a Set, You Need Behavioral Biometrics
The Register recently reported that initial access brokers are doing a brisk business following the work-from-home push of 2020. Among

With Behavioral Biometrics, IAM Meets DFIR
Modern DFIR practices and processes bring a whole slew of systems, data sources, and types of expertise to bear in

Identity in Cybersecurity Ep. 9 — Reducing the Noise
How do you prevent juggling thirty disparate security tools? Do you find it hard to correlate relationships between massive amounts

Identity in Cybersecurity Ep. 8 — The Visibility Issue
How do you source cybersecurity talent? Which skills or certifications actually make the best hires? In this episode, Plurilock™ CEO

Introducing Our Q4’20 Release—With Scalability, Proxy, and Support Enhancements
Over the second half of 2020, we've been privileged to have received a good deal of valuable feedback from our