Scroll down for all the latest news and information looking at virtual authentication.
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
Pushed to the edges by efficient EDRs, threat actors are forced to use living-off-the-land techniques
During the Cloud & Cyber Security Expo, cloud security experts attributed the security shortcomings of cloud users to misconceptions over their responsibility
Recorded Future analyzed how threat actors have been exploiting VMware ESXi vulnerabilities over the past three years
The use of machine identity tools is growing in state-sponsored cyber-attacks
Benjamin David examines the potential future impact - both good and bad - of emerging technologies
Moving from conventional passwords to a more secure authentication method will improve an organization’s overall security