
Alert Fatigue Remains a Problem—and Needs a Different Class of Solutions
The average cost of a data breach in 2022 reached a record $3.86 million, yet the average time to identify and contain a breach was 277 days. How is it

Alert Fatigue Remains a Problem—and Needs a Different Class of Solutions
The average cost of a data breach in 2022 reached a record $3.86 million, yet the average time to identify and contain a breach was 277 days. How is it

Alert Fatigue Remains a Problem—and Needs a Different Class of Solutions
The average cost of a data breach in 2022 reached a record $3.86 million, yet the average time to identify and contain a breach was 277 days. How is it
Previous

Cybersecurity’s Women are Breaking Barriers, Leading the Way—But We Need More of Them
In today’s interconnected world, where cyber threats are on the rise, the need for skilled professionals in the field of

“Shadow AI” Is Becoming a Problem in IT, and It’s Going to Get Worse
Generative AI has seen explosive growth in popularity this year. Platforms like ChatGPT and Bard are quickly becoming go-to tools

Announcing Early Access Program Availability of Plurilock AI PromptGuard
The first half of 2023 has seen explosive growth in AI adoption. Employees across every sector of the economy are

AI Means Companies are Leaking More Confidential Data Than Ever Before
Once a matter of science fiction, artificial intelligence (AI) has now been seamlessly integrated into our lives. Open your phone

Cyberattacks are Increasing in This Surprising Sector
When I mention the terms “ransomware attack” or “data breach,” what’s the first sector or business you think of? Most

Who is Lapsus$?
Who is Lapsus$? After claiming responsibility for high-profile attacks on major corporations like Microsoft, Okta, Samsung, Ubisoft, and NVIDIA at

Cybersecurity Positions and the Need To Think Differently
Introduction In the 1993 film Rookie of the Year, coach Larry Fisher, thinking differently while fighting to save his club

Behavioral Biometrics and Passive Identity Authentication in Support of Zero Trust Architecture
A zero-trust security architecture has a minimized threat surface and more control over authentication and user access. It is a

Behavioral Biometric Systems: Privacy-Friendly, Less Risky, More Compliant, and More Secure
Many organizations today depend on digital services and data to run daily operations and ensuring the privacy of critical data

Zero Trust, the Workplace, and Post-COVID: 5 Questions Answered
Zero trust. Those two words are gaining ground as businesses continue to weather the pandemic. COVID-19’s sudden impact in 2020

U.S. Government Announces Zero Trust Requirement for Federal Agencies
On the heels of a White House memo published in mid-January, the Office of Management and Budget (OMB) has issued

Biden’s Memo Calls for Cybersecurity Improvements for National Security
Weeks into 2022, following a record-breaking year of more than 1,200 cyber attacks, President Biden’s White House has issued a

Cybersecurity Year in Review: Big Breaches, Ransomware & Zero Trust
In recent years there has been a significant increase in the number of cyber attacks, and 2021 was no different.

Cybersecurity Awareness Month and the Need for a Zero Trust Architecture
While we at Plurilock™ know that cybersecurity is a year-round effort, October marks the 18th annual Cybersecurity Awareness Month, bringing

Zero Trust and Privileged Access Management: NIST 800-207
Zero trust has been a long-known concept within the cybersecurity industry but has not, until recently, trickled out into the

The Existing Authentication Paradigm is Failing Us
The headlines make clear what many in the industry have long known to be true – cyberattacks are on the

Biden’s Executive Order on Cybersecurity Is a Needed Response to Growing Cyber Threats
Over the last year, we’ve seen a series of dramatic cyber-attacks on U.S. soil. Just three of these paint a

Plurilock™ Enables Critical Systems to Both Restrict and Guarantee Access at the Same Time, Seamlessly
Critical systems are a tricky problem in most organizations. They're not just critical because bad things will happen if they