Author: Shamalee Deshpande

Aug 2, 2022
New cyber insurance requirements place high demands on education
The education sector currently faces the highest volume of cyberattacks of any sector, with 60% of educational institutions (higher and lower) suffering ransomware attacks in 2021. Cyberattacks are a source of significant cost and can cause major disruption to school operations, which was the case of the recent attacks at UMass and Baltimore County Public …

Apr 26, 2022
The real reason legacy authentication doesn’t work for shared workstations
Most organizations struggle with legacy authentication, with passwords and mobile-based solutions a source of security risk, high IT cost, and frustrated users. However, for organizations with shared workstations and shared device environments, these pain points are only intensified. Shared workstations—common across industries such as healthcare, manufacturing, retail and hospitality, financial services, energy, utilities, oil and …

Feb 22, 2022
Privileged Access Management at CERN: Q&A with Dr. Stefan Lüders
In an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security …

Dec 6, 2021
A Day in the Life: Dispelling the Myths of Mobile Authentication
COVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is …

Mar 24, 2021
New administration and Covid-19 aftermath surges demand for next-gen security in public sector
2021 marks the year that two game-changing events have put onboarding remote employees and strong authentication on the radar for many public sector agency heads. Since March 2020 most government workers, like everyone else, have been forced to work remotely in systems that were not designed for secure work-from-home situations. IT executives scrambled to find …

Jan 12, 2021
Why 3 government agencies are relying on hardware-based MFA with YubiKeys
America’s government is under attack. To put it more accurately, its governments are under attack, all the time, at every level — federal, state, and local — from opportunistic scammers, sophisticated cybercriminals, and even state actors. We’ve all seen the stories about intelligence services stealing political emails, snooping into election systems, and even penetrating the US power grid. But those are just …