How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

Most Recent

Hot this week

Leave a minimal digital footprint

Your digital footprint paints a picture of who you...

How Kenyans (and the world) are falling for a Bitcoin Scam

Bitcoin scams seem to gain track in Kenya and globally overall. Here, Blancos explains how these scams operate, and how to really identify...

Ransomware: Now and The Future

Ransomware has staked its claim as a major element...

Attack Lifecycle story – part 1

I was recently explaining to a group of colleagues...

​How to build a data driven culture in your business

Making business decisions based on the best available data is fundamental, but not always easy. Technology, processes, and company culture can all have an impact on how data is used within an organisation. Digital leaders suggest organisations must focus on three key areas: strategy, culture, and agility, which was discussed at a recent event held [...]
spot_img

Follow us

26,400FansLike
7,500FollowersFollow
2,898SubscribersSubscribe

Popular Categories

AI

The B Blog Cybersecurity News

Building Secure AI Agents Key Lessons Learned

0
Essential security practices for developing trustworthy AI agents, including permission structures, data handling, and human oversight mechanisms that prevent system failures.
The B Blog Cybersecurity News

AI Search Tools Threaten Publisher Survival

0
AI search engines reduce traffic to publishers, threatening content quality and cybersecurity. Learn actionable ways to support reliable sources and verify information.
The B Blog Cybersecurity News

Fake AI Installers and the Malware They Deliver

0
Cybercriminals create fake download pages for popular AI tools that actually deliver information stealing malware. Learn how to spot these traps and protect your data.
spot_imgspot_img

Kenya

Meta/Facebook

Philosophy

Hackers are exploiting a Sophos firewall zero-day

Hackers targeted Sophos XG Firewall devices that had their administration (HTTPS service) or the User Portal control panel exposed on the internet.

Editor's choice

Blancos Khim

Cloud

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Recurringly, organizations fail to ask themselves the most rudimentary questions before moving to cloud platforms, and they suffer as a result...

China

How To

Video News

spot_imgspot_img
spot_img