
ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology

ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology

ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology
Previous

NIST’s Draft Zero Trust Standard Calls for Continuous Authentication
Zero trust is rapidly becoming a cybersecurity best practice, and to buttress this point, the US National Institute for Standards

Yes, There Is a Phishing Solution That Doesn’t Make Logins Hard
Phishing has been with us for many years now—almost as long as the problem of email SPAM itself. Of course,

Massive Breach Shows That Not All Biometric Technologies Are Equal
The security web is abuzz with details about another massive breach. This time, 27 million data records stored in Suprema,

Two-Step Authentication is Not Two-Factor Authentication
Your team, your regulators, your clients, and the cybersecurity pundit class have all been telling you for some time now

Why Plurilock™ Products Are a Step Ahead of Competing Solutions
Behavioral biometrics is enjoying something of a boom over the last year or two. Analysts now predict a large role

What Plurilock’s Defense Contracts Reveal About Authentication Today
Plurilock has just been awarded another government contract to develop new cybersecurity capabilities, this time for Canada’s Department of National

Zero Trust Means Zero Trust, Not “Trust All Recognized Users”
Lost in the shuffle of the "zero trust" marketing melee over the last several years is the very basic idea

Your “Zero Trust” Company May Be More Trusting Than You Imagine
What do you do when the corporate breach rate skyrockets? You lock things down. More and more tightly. Thus we

If You’re Not Using MFA, You’re Not Complying with Educational Data Protections
Health data and financial data are often at the center of data security discussions. Often forgotten but no less important

Podcast: Bank Attacks Put Password Insecurity Back in the Spotlight
Plurilock™ CEO Ian Paterson recently appeared on The Security Ledger podcast, Episode 145, to talk about the future of passwords

HIPAA and PIPEDA are More Strict About Authentication Than You Realize
Healthcare providers and related companies in the United States and Canada are required to comply with the Health Insurance Portability

You Need Advanced Authentication for These Seven Good Reasons
There is always a sneaky temptation to avoid fiddling with production systems. The applications are up? The users are logging

Know Which MFA Technologies to Avoid—and Which to Embrace
If you don’t yet use multi-factor authentication at your organization, chances are you’re actively looking to implement it—and finding that

Bad Authentication UX is Becoming Obsolete
UX, short for “User eXperience,” is one of the great keys to productivity in the computing age. Why? Because the

Invisible Authentication Solves MFA’s Many Privacy Problems
Privacy is now front and center in technology. Facebook, Apple, Huawei, Google, you name the brand and they’re appearing in

Podcast: Behavioral Biometrics and Cybersecurity, Past and Present
Plurilock™ CEO Ian Paterson recently appeared with host Dave Bittner on the well-known CyberWire Daily Podcast, Episode 721, to talk

Podcast: What is Multi-factor Authentication?
Plurilock™ CEO Ian Paterson recently chatted about multi-factor authentication with Tom Eston from The Shared Security Podcast, in Episode 58.

Embrace Device-free Authentication, But Do It the Right Way
Authentication is frustrating for today’s users. Another notification. Another multi-digit code to type in. Another occasion to reach for the


Safeguard your company data.
Stop unauthorized downloading, uploading, copy-pasting, emailing, and sharing.