
ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology

ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology

ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology
Previous

Announcing Our Summer ’20 Release of ADAPT— Now with SAML and OpenID Connect
Plurilock™ released ADAPT, our invisible login MFA product, in early 2019. Based on the same science that lies behind our

Identity in Cybersecurity Ep. 4 — Seeing the Big Picture
As a cybersecurity professional, how do you balance privacy and transparency? How about equality and diversity? Security and usability? How

Especially During COVID, MFA Remains a Challenge to Deploy
By now, the stat is well known. At RSA, Microsoft reported that 99.9% of credential-driven data breaches involve accounts that

Why Most “Passwordless” Authentication Solutions Aren’t Actually Passwordless
Authentication is already a modern necessity, and passwordless authentication is fast becoming one. Let's take a moment to review why,

Give This WFH Security Hygiene Checklist to Your Employees
This year an unprecedented proportion of the world's workforces have transitioned to full-time remote work, a shift dictated by facts

Identity in Cybersecurity Ep. 3 — The Never-ending Chain
What are we missing in the bigger cybersecurity picture—beyond the systems, technologies, best practices, and zero-day exploits that occupy so

Identity in Cybersecurity Ep. 2 — Follow the Data
How is our understanding of cybersecurity changing as technology becomes more central to society? What do these changes mean for

Here’s How to Secure Your Organization in the Unexpected Work-from-home Era
How is your office holding up to the new work-from-home reality? If yours is like most other offices right now,

Identity in Cybersecurity Ep. 1 — Walking the Security and Convenience Tightrope
How have the threats in cybersecurity changed over time? How secure is data access today compared to 10 years ago?

These Four Stories Show Why YubiKey Shouldn’t Be Your First—or Only—MFA Solution
A key part of our business at Plurilock™ involves helping companies to move beyond the multi-factor authentication infrastructure that they

Banks and Financials Are at an MFA Crossroads, and $5.2 Trillion Is at Stake
Accenture says that over $5.2 trillion in value will be lost in the financial services sector over the next five

Princeton Study Shows SMS Authentication Flows Are Just as Vulnerable as We Said They Were
Not a lot has changed since our post last year about the dangers of using SMS in two-factor authentication (2FA)

Canadian Medical Company LifeLabs Gets Hacked—and There Are Lessons in It for Everyone
Earlier this month, LifeLabs—a medical testing laboratory used by millions of patients and their physicians—announced that it had become the

CCPA is Coming, and Your Authentication Practices Matter
The California Consumer Privacy Act, enacted in 2018, goes into effect on January 1st, 2020—and imposes the strictest requirements in North

Soft Token vs Hard Token Authentication: Seven Token Authentication Families Compared
At their best, hardware tokens offer an alternative to the particular security, convenience, privacy, and cost issues that accompany phone-based

Non-repudiation is Becoming Important in Cybersecurity—But Choose a Strong Solution
Internal actors are implicated in more than a third of recent data breaches. If you're an IT or security professional

Many Continuous Authentication Solutions Aren’t What They Claim to Be
As "zero trust" picks up cybersecurity steam, more and more companies are considering continuous authentication solutions. This trend will likely

If You’re Pursuing Robotic Process Automation, You May Need Behavioral Biometrics
Robotic Process Automation (RPA) is taking enterprise computing by storm. As something like a cross between machine learning and old


Safeguard your company data.
Stop unauthorized downloading, uploading, copy-pasting, emailing, and sharing.