Security Awareness Training Involvement – Introducing Scirge Personal Dashboard
Although the security industry has long proclaimed that user awareness is the chea...
Thoughts and news on Shadow IT and credential-related threats—such as breaches and account takeover. Tips and product updates on how to gain control over unmanaged third-party business web accounts.
Although the security industry has long proclaimed that user awareness is the chea...
It’s no secret that cybersecurity threats are on the rise, and even tech giants li...
Understanding the needs of smaller organizations and cloud-first enterprises, we h...
Very recent breaches at LastPass and Norton LifeLock have stirred up the debate ab...
Big news in, we have just released a major feature: Instant Shadow IT Discovery! T...
One of the hardest things to do when it comes to security is to measure ROI. Test ...
Phishing attacks need no introduction, so we will skip the part where we discuss h...
Scirge version 3.3 has been released, with tons of improvements and new features. ...
Even though Microsoft has ranted about passwords being irrelevant, they do provide...
The recently released report by the National Cybersecurity Alliance on the percept...
When it comes to shadow IT and security, we have blogged about the oversight and c...
In the cutting-edge world of data, visibility into cloud and SaaS usage has been o...
As our next milestone, we are introducing version 3 of Scirge. We have added two m...
Password strength requirements have been around since the early 2000’s. Although t...
Account takeover (ATO) describes a scenario where user accounts and password integ...