Are Password Managers Broken?
Very recent breaches at LastPass and Norton LifeLock have stirred up the debate ab...
Thoughts and news on Shadow IT and credential-related threats—such as breaches and account takeover. Tips and product updates on how to gain control over unmanaged third-party business web accounts.
Very recent breaches at LastPass and Norton LifeLock have stirred up the debate ab...
Big news in, we have just released a major feature: Instant Shadow IT Discovery! T...
One of the hardest things to do when it comes to security is to measure ROI. Test ...
Phishing attacks need no introduction, so we will skip the part where we discuss h...
Scirge version 3.3 has been released, with tons of improvements and new features. ...
Even though Microsoft has ranted about passwords being irrelevant, they do provide...
The recently released report by the National Cybersecurity Alliance on the percept...
When it comes to shadow IT and security, we have blogged about the oversight and c...
In the cutting-edge world of data, visibility into cloud and SaaS usage has been o...
As our next milestone, we are introducing version 3 of Scirge. We have added two m...
Password strength requirements have been around since the early 2000’s. Although t...
Account takeover (ATO) describes a scenario where user accounts and password integ...
Credential stuffing is the automated injection of usernames and passwords – usuall...
In order to understand your Cloud footprint, it’s crucial to collect information f...
Due to the global pandemic, most of our lives and livelihoods have shifted online....