News and Research

What to expect during your next penetration test

For some businesses, vulnerability and penetration testing is a deeply-ingrained process that just works. However, for many others, this exercise is less known – arguably a mysterious, if not a downright scary aspect of running an information security program.... Read More

O365 attacks continue exploiting your weakest link

With more than 120 million active users, Office (O365) is a frontrunner in the cloud service popularity contest. Consequently, its users are equally popular with hackers. For IT pros, storing data in the cloud means a bigger attack surface,... Read More

Lori Österholm

Specops Software Appoints New CTO and Expands Development Team

Stockholm, Sweden – February 22, 2018. Specops Software announced today the appointment of Lori Österholm as Chief Technology Officer. The company also announced today the further expansion of the development team in the European and North American operations. Former... Read More

Knowledge Based Authentication fails to deliver

Knowledge based authentication (KBA) has long been used as the backup verification method when someone has forgotten their password. But even if it is regularly in use, it fails to deliver on the identity verification promise. Static and dynamic... Read More

What breach disclosure requirements mean for your organization

Following a data breach incident, organizations following compliance standards, such as HIPAA, need to follow certain data breach notification requirements. This post will summarize some of these requirements, as well as regional-specific disclosure responsibilities. For the purposes of this... Read More