An overview of methods used in the wild to detect jailbreaks, as well as methods used to evade detection.
See the Duo Labs team's writeup of how they solved the SANS 2018 Holiday Hack Challenge.
Protecting your VPN access with multi-factor authentication (MFA) adds an additional layer of defense. In our new ebook, 5 Reasons to Protect Your VPN With MFA, we dig deeper into the benefits of putting MFA on top of your VPN deployment.
In this post, we will focus on the pain points that are associated with the Health Insurance Portability and Accountability Act (HIPAA) Omnibus Rule and the Drug Enforcement Administration (DEA) requirements around Electronic Prescriptions for Controlled Substances (EPCS).
Despite the new year, has anything really changed when it comes to the security threat landscape? Here's why a zero-trust security approach is re-emerging in defense of the same old attacks.
In this blog post, we’ll cover how the lack of administrative visibility into unmanaged personal devices (also known as bring your own device - BYOD) accessing personal health information (PHI) is a major concern for IT operations.
The OMB (Office of Management and Budget) has finally dropped the new Trusted Internet Connections (TIC) draft policy and boy is it a doozy...in the best possible way.
A common concern of IT operations leaders is how to deploy access security technology while minimizing the impact on their support teams, simplifying access control management and making security usable for clinicians.
Ensuring a smooth user experience is one key aspect of choosing and implementing an effective two-factor authentication and endpoint solution that can meet compliance regulations and enable clinicians to do their job securely, without interruptions.
What do usability lessons mean for the future of security technology? Learn about how passwordless authentication, WebAuthn, U2F and zero-trust networking are revolutionizing how we securely log in.